Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2021-42384 (GCVE-0-2021-42384)
Vulnerability from cvelistv5 – Published: 2021-11-15 00:00 – Updated: 2025-11-03 20:34{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2025-11-03T20:34:12.518Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_transferred"
],
"url": "https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/"
},
{
"name": "FEDORA-2021-5a95823596",
"tags": [
"vendor-advisory",
"x_transferred"
],
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/"
},
{
"name": "FEDORA-2021-c52c0fe490",
"tags": [
"vendor-advisory",
"x_transferred"
],
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/"
},
{
"tags": [
"x_transferred"
],
"url": "https://security.netapp.com/advisory/ntap-20211223-0002/"
},
{
"tags": [
"x_transferred"
],
"url": "https://claroty.com/team82/research/unboxing-busybox-14-vulnerabilities-uncovered-by-claroty-jfrog"
},
{
"url": "https://lists.debian.org/debian-lts-announce/2025/01/msg00012.html"
}
],
"title": "CVE Program Container"
},
{
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.2,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
}
},
{
"other": {
"content": {
"id": "CVE-2021-42384",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "no"
},
{
"Technical Impact": "total"
}
],
"role": "CISA Coordinator",
"timestamp": "2025-04-23T13:32:01.944613Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2025-04-23T19:23:08.893Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"product": "busybox",
"vendor": "busybox",
"versions": [
{
"lessThan": "1.34.0",
"status": "affected",
"version": "unspecified",
"versionType": "custom"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "A use-after-free in Busybox\u0027s awk applet leads to denial of service and possibly code execution when processing a crafted awk pattern in the handle_special function"
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-416",
"description": "CWE-416",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2023-04-25T00:00:00.000Z",
"orgId": "48a46f29-ae42-4e1d-90dd-c1676c1e5e6d",
"shortName": "JFROG"
},
"references": [
{
"url": "https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/"
},
{
"name": "FEDORA-2021-5a95823596",
"tags": [
"vendor-advisory"
],
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/"
},
{
"name": "FEDORA-2021-c52c0fe490",
"tags": [
"vendor-advisory"
],
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/"
},
{
"url": "https://security.netapp.com/advisory/ntap-20211223-0002/"
},
{
"url": "https://claroty.com/team82/research/unboxing-busybox-14-vulnerabilities-uncovered-by-claroty-jfrog"
}
]
}
},
"cveMetadata": {
"assignerOrgId": "48a46f29-ae42-4e1d-90dd-c1676c1e5e6d",
"assignerShortName": "JFROG",
"cveId": "CVE-2021-42384",
"datePublished": "2021-11-15T00:00:00.000Z",
"dateReserved": "2021-10-14T00:00:00.000Z",
"dateUpdated": "2025-11-03T20:34:12.518Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.2",
"vulnerability-lookup:meta": {
"fkie_nvd": {
"configurations": "[{\"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:busybox:busybox:*:*:*:*:*:*:*:*\", \"versionStartIncluding\": \"1.18.0\", \"versionEndIncluding\": \"1.33.1\", \"matchCriteriaId\": \"6BB249A2-48D9-4FA1-B344-1E3595A8FFB6\"}]}]}, {\"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:fedoraproject:fedora:33:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"E460AA51-FCDA-46B9-AE97-E6676AA5E194\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:fedoraproject:fedora:34:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"A930E247-0B43-43CB-98FF-6CE7B8189835\"}]}]}]",
"descriptions": "[{\"lang\": \"en\", \"value\": \"A use-after-free in Busybox\u0027s awk applet leads to denial of service and possibly code execution when processing a crafted awk pattern in the handle_special function\"}, {\"lang\": \"es\", \"value\": \"Un uso de memoria previamente liberada en el applet awk de Busybox conduce a la denegaci\\u00f3n de servicio y posiblemente a una ejecuci\\u00f3n de c\\u00f3digo cuando es procesado un patr\\u00f3n awk dise\\u00f1ado en la funci\\u00f3n handle_special\"}]",
"id": "CVE-2021-42384",
"lastModified": "2024-11-21T06:27:42.530",
"metrics": "{\"cvssMetricV31\": [{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"cvssData\": {\"version\": \"3.1\", \"vectorString\": \"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H\", \"baseScore\": 7.2, \"baseSeverity\": \"HIGH\", \"attackVector\": \"NETWORK\", \"attackComplexity\": \"LOW\", \"privilegesRequired\": \"HIGH\", \"userInteraction\": \"NONE\", \"scope\": \"UNCHANGED\", \"confidentialityImpact\": \"HIGH\", \"integrityImpact\": \"HIGH\", \"availabilityImpact\": \"HIGH\"}, \"exploitabilityScore\": 1.2, \"impactScore\": 5.9}], \"cvssMetricV2\": [{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"cvssData\": {\"version\": \"2.0\", \"vectorString\": \"AV:N/AC:L/Au:S/C:P/I:P/A:P\", \"baseScore\": 6.5, \"accessVector\": \"NETWORK\", \"accessComplexity\": \"LOW\", \"authentication\": \"SINGLE\", \"confidentialityImpact\": \"PARTIAL\", \"integrityImpact\": \"PARTIAL\", \"availabilityImpact\": \"PARTIAL\"}, \"baseSeverity\": \"MEDIUM\", \"exploitabilityScore\": 8.0, \"impactScore\": 6.4, \"acInsufInfo\": false, \"obtainAllPrivilege\": false, \"obtainUserPrivilege\": false, \"obtainOtherPrivilege\": false, \"userInteractionRequired\": false}]}",
"published": "2021-11-15T21:15:08.070",
"references": "[{\"url\": \"https://claroty.com/team82/research/unboxing-busybox-14-vulnerabilities-uncovered-by-claroty-jfrog\", \"source\": \"reefs@jfrog.com\"}, {\"url\": \"https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/\", \"source\": \"reefs@jfrog.com\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/\", \"source\": \"reefs@jfrog.com\"}, {\"url\": \"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/\", \"source\": \"reefs@jfrog.com\"}, {\"url\": \"https://security.netapp.com/advisory/ntap-20211223-0002/\", \"source\": \"reefs@jfrog.com\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"https://claroty.com/team82/research/unboxing-busybox-14-vulnerabilities-uncovered-by-claroty-jfrog\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"https://security.netapp.com/advisory/ntap-20211223-0002/\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Third Party Advisory\"]}]",
"sourceIdentifier": "reefs@jfrog.com",
"vulnStatus": "Modified",
"weaknesses": "[{\"source\": \"reefs@jfrog.com\", \"type\": \"Secondary\", \"description\": [{\"lang\": \"en\", \"value\": \"CWE-416\"}]}, {\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"description\": [{\"lang\": \"en\", \"value\": \"CWE-416\"}]}]"
},
"nvd": "{\"cve\":{\"id\":\"CVE-2021-42384\",\"sourceIdentifier\":\"reefs@jfrog.com\",\"published\":\"2021-11-15T21:15:08.070\",\"lastModified\":\"2025-11-03T21:15:46.123\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"A use-after-free in Busybox\u0027s awk applet leads to denial of service and possibly code execution when processing a crafted awk pattern in the handle_special function\"},{\"lang\":\"es\",\"value\":\"Un uso de memoria previamente liberada en el applet awk de Busybox conduce a la denegaci\u00f3n de servicio y posiblemente a una ejecuci\u00f3n de c\u00f3digo cuando es procesado un patr\u00f3n awk dise\u00f1ado en la funci\u00f3n handle_special\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H\",\"baseScore\":7.2,\"baseSeverity\":\"HIGH\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"HIGH\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"HIGH\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":1.2,\"impactScore\":5.9},{\"source\":\"134c704f-9b21-4f2e-91b3-4a467353bcc0\",\"type\":\"Secondary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H\",\"baseScore\":7.2,\"baseSeverity\":\"HIGH\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"HIGH\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"HIGH\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":1.2,\"impactScore\":5.9}],\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:N/AC:L/Au:S/C:P/I:P/A:P\",\"baseScore\":6.5,\"accessVector\":\"NETWORK\",\"accessComplexity\":\"LOW\",\"authentication\":\"SINGLE\",\"confidentialityImpact\":\"PARTIAL\",\"integrityImpact\":\"PARTIAL\",\"availabilityImpact\":\"PARTIAL\"},\"baseSeverity\":\"MEDIUM\",\"exploitabilityScore\":8.0,\"impactScore\":6.4,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"reefs@jfrog.com\",\"type\":\"Secondary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-416\"}]},{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-416\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:busybox:busybox:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"1.18.0\",\"versionEndIncluding\":\"1.33.1\",\"matchCriteriaId\":\"6BB249A2-48D9-4FA1-B344-1E3595A8FFB6\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:fedoraproject:fedora:33:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E460AA51-FCDA-46B9-AE97-E6676AA5E194\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:fedoraproject:fedora:34:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A930E247-0B43-43CB-98FF-6CE7B8189835\"}]}]}],\"references\":[{\"url\":\"https://claroty.com/team82/research/unboxing-busybox-14-vulnerabilities-uncovered-by-claroty-jfrog\",\"source\":\"reefs@jfrog.com\"},{\"url\":\"https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/\",\"source\":\"reefs@jfrog.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/\",\"source\":\"reefs@jfrog.com\"},{\"url\":\"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/\",\"source\":\"reefs@jfrog.com\"},{\"url\":\"https://security.netapp.com/advisory/ntap-20211223-0002/\",\"source\":\"reefs@jfrog.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://claroty.com/team82/research/unboxing-busybox-14-vulnerabilities-uncovered-by-claroty-jfrog\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://lists.debian.org/debian-lts-announce/2025/01/msg00012.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://security.netapp.com/advisory/ntap-20211223-0002/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]}]}}",
"vulnrichment": {
"containers": "{\"adp\": [{\"title\": \"CVE Program Container\", \"references\": [{\"url\": \"https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/\", \"tags\": [\"x_transferred\"]}, {\"url\": \"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/\", \"name\": \"FEDORA-2021-5a95823596\", \"tags\": [\"vendor-advisory\", \"x_transferred\"]}, {\"url\": \"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/\", \"name\": \"FEDORA-2021-c52c0fe490\", \"tags\": [\"vendor-advisory\", \"x_transferred\"]}, {\"url\": \"https://security.netapp.com/advisory/ntap-20211223-0002/\", \"tags\": [\"x_transferred\"]}, {\"url\": \"https://claroty.com/team82/research/unboxing-busybox-14-vulnerabilities-uncovered-by-claroty-jfrog\", \"tags\": [\"x_transferred\"]}, {\"url\": \"https://lists.debian.org/debian-lts-announce/2025/01/msg00012.html\"}], \"providerMetadata\": {\"orgId\": \"af854a3a-2127-422b-91ae-364da2661108\", \"shortName\": \"CVE\", \"dateUpdated\": \"2025-11-03T20:34:12.518Z\"}}, {\"title\": \"CISA ADP Vulnrichment\", \"metrics\": [{\"cvssV3_1\": {\"scope\": \"UNCHANGED\", \"version\": \"3.1\", \"baseScore\": 7.2, \"attackVector\": \"NETWORK\", \"baseSeverity\": \"HIGH\", \"vectorString\": \"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H\", \"integrityImpact\": \"HIGH\", \"userInteraction\": \"NONE\", \"attackComplexity\": \"LOW\", \"availabilityImpact\": \"HIGH\", \"privilegesRequired\": \"HIGH\", \"confidentialityImpact\": \"HIGH\"}}, {\"other\": {\"type\": \"ssvc\", \"content\": {\"id\": \"CVE-2021-42384\", \"role\": \"CISA Coordinator\", \"options\": [{\"Exploitation\": \"none\"}, {\"Automatable\": \"no\"}, {\"Technical Impact\": \"total\"}], \"version\": \"2.0.3\", \"timestamp\": \"2025-04-23T13:32:01.944613Z\"}}}], \"providerMetadata\": {\"orgId\": \"134c704f-9b21-4f2e-91b3-4a467353bcc0\", \"shortName\": \"CISA-ADP\", \"dateUpdated\": \"2025-04-23T15:24:32.307Z\"}}], \"cna\": {\"affected\": [{\"vendor\": \"busybox\", \"product\": \"busybox\", \"versions\": [{\"status\": \"affected\", \"version\": \"unspecified\", \"lessThan\": \"1.34.0\", \"versionType\": \"custom\"}]}], \"references\": [{\"url\": \"https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/\"}, {\"url\": \"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/\", \"name\": \"FEDORA-2021-5a95823596\", \"tags\": [\"vendor-advisory\"]}, {\"url\": \"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/\", \"name\": \"FEDORA-2021-c52c0fe490\", \"tags\": [\"vendor-advisory\"]}, {\"url\": \"https://security.netapp.com/advisory/ntap-20211223-0002/\"}, {\"url\": \"https://claroty.com/team82/research/unboxing-busybox-14-vulnerabilities-uncovered-by-claroty-jfrog\"}], \"descriptions\": [{\"lang\": \"en\", \"value\": \"A use-after-free in Busybox\u0027s awk applet leads to denial of service and possibly code execution when processing a crafted awk pattern in the handle_special function\"}], \"problemTypes\": [{\"descriptions\": [{\"lang\": \"en\", \"type\": \"CWE\", \"cweId\": \"CWE-416\", \"description\": \"CWE-416\"}]}], \"providerMetadata\": {\"orgId\": \"48a46f29-ae42-4e1d-90dd-c1676c1e5e6d\", \"shortName\": \"JFROG\", \"dateUpdated\": \"2023-04-25T00:00:00.000Z\"}}}",
"cveMetadata": "{\"cveId\": \"CVE-2021-42384\", \"state\": \"PUBLISHED\", \"dateUpdated\": \"2025-11-03T20:34:12.518Z\", \"dateReserved\": \"2021-10-14T00:00:00.000Z\", \"assignerOrgId\": \"48a46f29-ae42-4e1d-90dd-c1676c1e5e6d\", \"datePublished\": \"2021-11-15T00:00:00.000Z\", \"assignerShortName\": \"JFROG\"}",
"dataType": "CVE_RECORD",
"dataVersion": "5.2"
}
}
}
CNVD-2021-88210
Vulnerability from cnvd - Published: 2021-11-17目前厂商已发布升级补丁以修复漏洞,补丁获取链接: https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/
| Name | BusyBox BusyBox >=1.18.0,<=1.33.1 |
|---|
{
"cves": {
"cve": {
"cveNumber": "CVE-2021-42384"
}
},
"description": "BusyBox\u662f\u4e4c\u514b\u5170Denis Vlasenko\u4e2a\u4eba\u5f00\u53d1\u8005\u7684\u4e00\u5957\u5305\u542b\u4e86\u591a\u4e2alinux\u547d\u4ee4\u548c\u5de5\u5177\u7684\u5e94\u7528\u7a0b\u5e8f\u3002\n\nBusybox\u7684awk applet\u5b58\u5728\u8d44\u6e90\u7ba1\u7406\u9519\u8bef\u6f0f\u6d1e\uff0c\u653b\u51fb\u8005\u53ef\u5229\u7528\u8be5\u6f0f\u6d1e\u5728handle_\u7279\u6b8a\u51fd\u6570\u4e2d\u5904\u7406\u7279\u5236\u7684awk\u6a21\u5f0f\u65f6\u6267\u884c\u4ee3\u7801\u3002",
"formalWay": "\u76ee\u524d\u5382\u5546\u5df2\u53d1\u5e03\u5347\u7ea7\u8865\u4e01\u4ee5\u4fee\u590d\u6f0f\u6d1e\uff0c\u8865\u4e01\u83b7\u53d6\u94fe\u63a5\uff1a\r\nhttps://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/",
"isEvent": "\u901a\u7528\u8f6f\u786c\u4ef6\u6f0f\u6d1e",
"number": "CNVD-2021-88210",
"openTime": "2021-11-17",
"patchDescription": "BusyBox\u662f\u4e4c\u514b\u5170Denis Vlasenko\u4e2a\u4eba\u5f00\u53d1\u8005\u7684\u4e00\u5957\u5305\u542b\u4e86\u591a\u4e2alinux\u547d\u4ee4\u548c\u5de5\u5177\u7684\u5e94\u7528\u7a0b\u5e8f\u3002\r\n\r\nBusybox\u7684awk applet\u5b58\u5728\u8d44\u6e90\u7ba1\u7406\u9519\u8bef\u6f0f\u6d1e\uff0c\u653b\u51fb\u8005\u53ef\u5229\u7528\u8be5\u6f0f\u6d1e\u5728handle_\u7279\u6b8a\u51fd\u6570\u4e2d\u5904\u7406\u7279\u5236\u7684awk\u6a21\u5f0f\u65f6\u6267\u884c\u4ee3\u7801\u3002\u76ee\u524d\uff0c\u4f9b\u5e94\u5546\u53d1\u5e03\u4e86\u5b89\u5168\u516c\u544a\u53ca\u76f8\u5173\u8865\u4e01\u4fe1\u606f\uff0c\u4fee\u590d\u4e86\u6b64\u6f0f\u6d1e\u3002",
"patchName": "BusyBox\u8d44\u6e90\u7ba1\u7406\u9519\u8bef\u6f0f\u6d1e\uff08CNVD-2021-88210\uff09\u7684\u8865\u4e01",
"products": {
"product": "BusyBox BusyBox \u003e=1.18.0\uff0c\u003c=1.33.1"
},
"referenceLink": "https://nvd.nist.gov/vuln/detail/CVE-2021-42384",
"serverity": "\u4e2d",
"submitTime": "2021-11-12",
"title": "BusyBox\u8d44\u6e90\u7ba1\u7406\u9519\u8bef\u6f0f\u6d1e\uff08CNVD-2021-88210\uff09"
}
CERTFR-2025-AVI-0158
Vulnerability from certfr_avis - Published: - Updated:
De multiples vulnérabilités ont été découvertes dans les produits NetApp. Elles permettent à un attaquant de provoquer un déni de service à distance, une atteinte à la confidentialité des données et une atteinte à l'intégrité des données.
Solutions
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
| Vendor | Product | Description | ||
|---|---|---|---|---|
| NetApp | ONTAP tools pour VMware vSphere 10 | ONTAP tools for VMware vSphere 10 versions antérieures à 10.3 | ||
| NetApp | HCI Compute Node (Bootstrap OS) | HCI Compute Node (Bootstrap OS) versions antérieures à 12.8 | ||
| NetApp | SolidFire & HCI Storage Node (Element Software) | SolidFire & HCI Storage Node (Element Software) versions antérieures à 12.8 | ||
| NetApp | SolidFire & HCI Management Node | SolidFire & HCI Management Node versions antérieures à 12.8 |
| Title | Publication Time | Tags | |||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "ONTAP tools for VMware vSphere 10 versions ant\u00e9rieures \u00e0 10.3",
"product": {
"name": "ONTAP tools pour VMware vSphere 10",
"vendor": {
"name": "NetApp",
"scada": false
}
}
},
{
"description": "HCI Compute Node (Bootstrap OS) versions ant\u00e9rieures \u00e0 12.8",
"product": {
"name": "HCI Compute Node (Bootstrap OS)",
"vendor": {
"name": "NetApp",
"scada": false
}
}
},
{
"description": "SolidFire \u0026 HCI Storage Node (Element Software) versions ant\u00e9rieures \u00e0 12.8",
"product": {
"name": "SolidFire \u0026 HCI Storage Node (Element Software)",
"vendor": {
"name": "NetApp",
"scada": false
}
}
},
{
"description": "SolidFire \u0026 HCI Management Node versions ant\u00e9rieures \u00e0 12.8",
"product": {
"name": "SolidFire \u0026 HCI Management Node",
"vendor": {
"name": "NetApp",
"scada": false
}
}
}
],
"affected_systems_content": "",
"content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).",
"cves": [
{
"name": "CVE-2024-24795",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-24795"
},
{
"name": "CVE-2021-42384",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-42384"
},
{
"name": "CVE-2021-42378",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-42378"
},
{
"name": "CVE-2021-42382",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-42382"
},
{
"name": "CVE-2021-42376",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-42376"
},
{
"name": "CVE-2023-38709",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-38709"
},
{
"name": "CVE-2024-51562",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-51562"
},
{
"name": "CVE-2024-27316",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27316"
},
{
"name": "CVE-2022-47629",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-47629"
},
{
"name": "CVE-2021-42373",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-42373"
},
{
"name": "CVE-2021-42377",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-42377"
},
{
"name": "CVE-2021-42386",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-42386"
},
{
"name": "CVE-2022-3515",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3515"
},
{
"name": "CVE-2025-0373",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0373"
},
{
"name": "CVE-2024-51565",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-51565"
},
{
"name": "CVE-2021-42380",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-42380"
},
{
"name": "CVE-2021-42374",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-42374"
},
{
"name": "CVE-2020-16593",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-16593"
},
{
"name": "CVE-2021-42379",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-42379"
},
{
"name": "CVE-2021-42381",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-42381"
},
{
"name": "CVE-2021-42383",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-42383"
},
{
"name": "CVE-2024-51563",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-51563"
},
{
"name": "CVE-2021-42385",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-42385"
},
{
"name": "CVE-2024-51564",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-51564"
},
{
"name": "CVE-2020-16599",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-16599"
},
{
"name": "CVE-2025-0374",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0374"
},
{
"name": "CVE-2021-42375",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-42375"
},
{
"name": "CVE-2025-0662",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0662"
},
{
"name": "CVE-2024-51566",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-51566"
}
],
"links": [],
"reference": "CERTFR-2025-AVI-0158",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2025-02-24T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les produits NetApp. Elles permettent \u00e0 un attaquant de provoquer un d\u00e9ni de service \u00e0 distance, une atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es et une atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es.",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits NetApp",
"vendor_advisories": [
{
"published_at": "2023-07-06",
"title": "Bulletin de s\u00e9curit\u00e9 NetApp NTAP-20230706-0008",
"url": "https://security.netapp.com/advisory/ntap-20230706-0008/"
},
{
"published_at": "2021-01-22",
"title": "Bulletin de s\u00e9curit\u00e9 NetApp NTAP-20210122-0003",
"url": "https://security.netapp.com/advisory/ntap-20210122-0003/"
},
{
"published_at": "2023-03-16",
"title": "Bulletin de s\u00e9curit\u00e9 NetApp NTAP-20230316-0011",
"url": "https://security.netapp.com/advisory/ntap-20230316-0011/"
},
{
"published_at": "2021-12-23",
"title": "Bulletin de s\u00e9curit\u00e9 NetApp NTAP-20211223-0002",
"url": "https://security.netapp.com/advisory/ntap-20211223-0002/"
},
{
"published_at": "2024-04-15",
"title": "Bulletin de s\u00e9curit\u00e9 NetApp NTAP-20240415-0013",
"url": "https://security.netapp.com/advisory/ntap-20240415-0013/"
}
]
}
CERTFR-2023-AVI-0220
Vulnerability from certfr_avis - Published: - Updated:
De multiples vulnérabilités ont été découvertes dans les produits Siemens. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance, un déni de service à distance et un contournement de la politique de sécurité.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Vendor | Product | Description | ||
|---|---|---|---|---|
| Siemens | N/A | SINEC NMS | ||
| Siemens | N/A | De nombreuses références SCALANCE et SIPROTEC (se référer aux bulletins de sécurité de l'éditeur pour les versions affectées) | ||
| Siemens | N/A | RUGGEDCOM CROSSBOW versions antérieures à V5.3 | ||
| Siemens | N/A | Mendix SAML (Mendix 9 compatible, New Track) versions 3.1.9 à 3.2.x antérieures à V3.3.0 | ||
| Siemens | N/A | Mendix SAML (Mendix 7 compatible) versions antérieures à V1.17.3 | ||
| Siemens | N/A | Mendix SAML (Mendix 8 compatible) versions antérieures à V2.3.0 | ||
| Siemens | N/A | SINEMA Server V14 | ||
| Siemens | N/A | Mendix SAML (Mendix 9 compatible, Upgrade Track) versions 3.1.9 à 3.2.x antérieures à V3.3.0 | ||
| Siemens | N/A | RUGGEDCOM RM1224 LTE(4G) EU (6GK6108-4AM00-2BA2) et NAM (6GK6108-4AM00-2DA2) versions antérieures à V7.2 |
| Title | Publication Time | Tags | ||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "SINEC NMS",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "De nombreuses r\u00e9f\u00e9rences SCALANCE et SIPROTEC (se r\u00e9f\u00e9rer aux bulletins de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour les versions affect\u00e9es)",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "RUGGEDCOM CROSSBOW versions ant\u00e9rieures \u00e0 V5.3",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "Mendix SAML (Mendix 9 compatible, New Track) versions 3.1.9 \u00e0 3.2.x ant\u00e9rieures \u00e0 V3.3.0",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "Mendix SAML (Mendix 7 compatible) versions ant\u00e9rieures \u00e0 V1.17.3",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "Mendix SAML (Mendix 8 compatible) versions ant\u00e9rieures \u00e0 V2.3.0",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SINEMA Server V14",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "Mendix SAML (Mendix 9 compatible, Upgrade Track) versions 3.1.9 \u00e0 3.2.x ant\u00e9rieures \u00e0 V3.3.0",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "RUGGEDCOM RM1224 LTE(4G) EU (6GK6108-4AM00-2BA2) et NAM (6GK6108-4AM00-2DA2) versions ant\u00e9rieures \u00e0 V7.2",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2022-1343",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1343"
},
{
"name": "CVE-2019-1125",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-1125"
},
{
"name": "CVE-2021-42384",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-42384"
},
{
"name": "CVE-2022-35252",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-35252"
},
{
"name": "CVE-2022-1473",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1473"
},
{
"name": "CVE-2021-42378",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-42378"
},
{
"name": "CVE-2022-30594",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-30594"
},
{
"name": "CVE-2021-42382",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-42382"
},
{
"name": "CVE-2021-42376",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-42376"
},
{
"name": "CVE-2022-24282",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-24282"
},
{
"name": "CVE-2019-1071",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-1071"
},
{
"name": "CVE-2022-28356",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-28356"
},
{
"name": "CVE-2022-4304",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-4304"
},
{
"name": "CVE-2018-12886",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-12886"
},
{
"name": "CVE-2022-32208",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32208"
},
{
"name": "CVE-2022-32296",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32296"
},
{
"name": "CVE-2022-2380",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2380"
},
{
"name": "CVE-2021-42373",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-42373"
},
{
"name": "CVE-2022-1292",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1292"
},
{
"name": "CVE-2021-42377",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-42377"
},
{
"name": "CVE-2022-1652",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1652"
},
{
"name": "CVE-2022-24281",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-24281"
},
{
"name": "CVE-2022-23037",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-23037"
},
{
"name": "CVE-2022-32207",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32207"
},
{
"name": "CVE-2022-23395",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-23395"
},
{
"name": "CVE-2023-0215",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0215"
},
{
"name": "CVE-2022-23042",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-23042"
},
{
"name": "CVE-2023-25957",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-25957"
},
{
"name": "CVE-2023-0286",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0286"
},
{
"name": "CVE-2021-42386",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-42386"
},
{
"name": "CVE-2022-2639",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2639"
},
{
"name": "CVE-2021-42380",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-42380"
},
{
"name": "CVE-2022-38767",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-38767"
},
{
"name": "CVE-2021-42374",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-42374"
},
{
"name": "CVE-2022-23036",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-23036"
},
{
"name": "CVE-2022-0002",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0002"
},
{
"name": "CVE-2023-27462",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-27462"
},
{
"name": "CVE-2022-1016",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1016"
},
{
"name": "CVE-2022-1975",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1975"
},
{
"name": "CVE-2022-23038",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-23038"
},
{
"name": "CVE-2023-27309",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-27309"
},
{
"name": "CVE-2018-25032",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-25032"
},
{
"name": "CVE-2022-0494",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0494"
},
{
"name": "CVE-2021-42379",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-42379"
},
{
"name": "CVE-2022-23039",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-23039"
},
{
"name": "CVE-2021-42381",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-42381"
},
{
"name": "CVE-2022-23040",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-23040"
},
{
"name": "CVE-2022-1304",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1304"
},
{
"name": "CVE-2022-1011",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1011"
},
{
"name": "CVE-2021-26401",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-26401"
},
{
"name": "CVE-2022-0547",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0547"
},
{
"name": "CVE-2021-42383",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-42383"
},
{
"name": "CVE-2022-23041",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-23041"
},
{
"name": "CVE-2022-1734",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1734"
},
{
"name": "CVE-2022-4450",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-4450"
},
{
"name": "CVE-2022-32205",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32205"
},
{
"name": "CVE-2022-32981",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32981"
},
{
"name": "CVE-2022-26490",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-26490"
},
{
"name": "CVE-2022-36946",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-36946"
},
{
"name": "CVE-2022-0001",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0001"
},
{
"name": "CVE-2021-42385",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-42385"
},
{
"name": "CVE-2022-23308",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-23308"
},
{
"name": "CVE-2022-36879",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-36879"
},
{
"name": "CVE-2022-1353",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1353"
},
{
"name": "CVE-2022-2588",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2588"
},
{
"name": "CVE-2019-1073",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-1073"
},
{
"name": "CVE-2022-32206",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32206"
},
{
"name": "CVE-2022-1729",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1729"
},
{
"name": "CVE-2021-4149",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-4149"
},
{
"name": "CVE-2017-5715",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-5715"
},
{
"name": "CVE-2022-1199",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1199"
},
{
"name": "CVE-2021-42375",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-42375"
},
{
"name": "CVE-2021-4034",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-4034"
},
{
"name": "CVE-2022-28390",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-28390"
},
{
"name": "CVE-2022-33981",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-33981"
},
{
"name": "CVE-2022-1974",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1974"
},
{
"name": "CVE-2023-27310",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-27310"
},
{
"name": "CVE-2022-30065",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-30065"
},
{
"name": "CVE-2022-25311",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-25311"
},
{
"name": "CVE-2022-1516",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1516"
},
{
"name": "CVE-2023-27463",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-27463"
},
{
"name": "CVE-2022-1198",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1198"
},
{
"name": "CVE-2022-20158",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-20158"
}
],
"links": [],
"reference": "CERTFR-2023-AVI-0220",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2023-03-14T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Injection de code indirecte \u00e0 distance (XSS)"
},
{
"description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
},
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
},
{
"description": "\u00c9l\u00e9vation de privil\u00e8ges"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les produits\nSiemens. Certaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer\nune ex\u00e9cution de code arbitraire \u00e0 distance, un d\u00e9ni de service \u00e0\ndistance et un contournement de la politique de s\u00e9curit\u00e9.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits Siemens",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Siemens ssa-419740 du 14 mars 2023",
"url": "https://cert-portal.siemens.com/productcert/html/ssa-419740.html"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Siemens ssa-320629 du 14 mars 2023",
"url": "https://cert-portal.siemens.com/productcert/html/ssa-320629.html"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Siemens ssa-250085 du 14 mars 2023",
"url": "https://cert-portal.siemens.com/productcert/html/ssa-250085.html"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Siemens ssa-203374 du 14 mars 2023",
"url": "https://cert-portal.siemens.com/productcert/html/ssa-203374.html"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Siemens ssa-851884 du 14 mars 2023",
"url": "https://cert-portal.siemens.com/productcert/html/ssa-851884.html"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Siemens ssa-565386 du 14 mars 2023",
"url": "https://cert-portal.siemens.com/productcert/html/ssa-565386.html"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Siemens ssa-260625 du 14 mars 2023",
"url": "https://cert-portal.siemens.com/productcert/html/ssa-260625.html"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Siemens ssa-726834 du 14 mars 2023",
"url": "https://cert-portal.siemens.com/productcert/html/ssa-726834.html"
}
]
}
CERTFR-2023-AVI-0220
Vulnerability from certfr_avis - Published: - Updated:
De multiples vulnérabilités ont été découvertes dans les produits Siemens. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance, un déni de service à distance et un contournement de la politique de sécurité.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Vendor | Product | Description | ||
|---|---|---|---|---|
| Siemens | N/A | SINEC NMS | ||
| Siemens | N/A | De nombreuses références SCALANCE et SIPROTEC (se référer aux bulletins de sécurité de l'éditeur pour les versions affectées) | ||
| Siemens | N/A | RUGGEDCOM CROSSBOW versions antérieures à V5.3 | ||
| Siemens | N/A | Mendix SAML (Mendix 9 compatible, New Track) versions 3.1.9 à 3.2.x antérieures à V3.3.0 | ||
| Siemens | N/A | Mendix SAML (Mendix 7 compatible) versions antérieures à V1.17.3 | ||
| Siemens | N/A | Mendix SAML (Mendix 8 compatible) versions antérieures à V2.3.0 | ||
| Siemens | N/A | SINEMA Server V14 | ||
| Siemens | N/A | Mendix SAML (Mendix 9 compatible, Upgrade Track) versions 3.1.9 à 3.2.x antérieures à V3.3.0 | ||
| Siemens | N/A | RUGGEDCOM RM1224 LTE(4G) EU (6GK6108-4AM00-2BA2) et NAM (6GK6108-4AM00-2DA2) versions antérieures à V7.2 |
| Title | Publication Time | Tags | ||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "SINEC NMS",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "De nombreuses r\u00e9f\u00e9rences SCALANCE et SIPROTEC (se r\u00e9f\u00e9rer aux bulletins de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour les versions affect\u00e9es)",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "RUGGEDCOM CROSSBOW versions ant\u00e9rieures \u00e0 V5.3",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "Mendix SAML (Mendix 9 compatible, New Track) versions 3.1.9 \u00e0 3.2.x ant\u00e9rieures \u00e0 V3.3.0",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "Mendix SAML (Mendix 7 compatible) versions ant\u00e9rieures \u00e0 V1.17.3",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "Mendix SAML (Mendix 8 compatible) versions ant\u00e9rieures \u00e0 V2.3.0",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SINEMA Server V14",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "Mendix SAML (Mendix 9 compatible, Upgrade Track) versions 3.1.9 \u00e0 3.2.x ant\u00e9rieures \u00e0 V3.3.0",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "RUGGEDCOM RM1224 LTE(4G) EU (6GK6108-4AM00-2BA2) et NAM (6GK6108-4AM00-2DA2) versions ant\u00e9rieures \u00e0 V7.2",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2022-1343",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1343"
},
{
"name": "CVE-2019-1125",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-1125"
},
{
"name": "CVE-2021-42384",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-42384"
},
{
"name": "CVE-2022-35252",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-35252"
},
{
"name": "CVE-2022-1473",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1473"
},
{
"name": "CVE-2021-42378",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-42378"
},
{
"name": "CVE-2022-30594",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-30594"
},
{
"name": "CVE-2021-42382",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-42382"
},
{
"name": "CVE-2021-42376",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-42376"
},
{
"name": "CVE-2022-24282",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-24282"
},
{
"name": "CVE-2019-1071",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-1071"
},
{
"name": "CVE-2022-28356",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-28356"
},
{
"name": "CVE-2022-4304",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-4304"
},
{
"name": "CVE-2018-12886",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-12886"
},
{
"name": "CVE-2022-32208",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32208"
},
{
"name": "CVE-2022-32296",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32296"
},
{
"name": "CVE-2022-2380",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2380"
},
{
"name": "CVE-2021-42373",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-42373"
},
{
"name": "CVE-2022-1292",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1292"
},
{
"name": "CVE-2021-42377",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-42377"
},
{
"name": "CVE-2022-1652",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1652"
},
{
"name": "CVE-2022-24281",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-24281"
},
{
"name": "CVE-2022-23037",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-23037"
},
{
"name": "CVE-2022-32207",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32207"
},
{
"name": "CVE-2022-23395",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-23395"
},
{
"name": "CVE-2023-0215",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0215"
},
{
"name": "CVE-2022-23042",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-23042"
},
{
"name": "CVE-2023-25957",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-25957"
},
{
"name": "CVE-2023-0286",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0286"
},
{
"name": "CVE-2021-42386",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-42386"
},
{
"name": "CVE-2022-2639",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2639"
},
{
"name": "CVE-2021-42380",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-42380"
},
{
"name": "CVE-2022-38767",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-38767"
},
{
"name": "CVE-2021-42374",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-42374"
},
{
"name": "CVE-2022-23036",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-23036"
},
{
"name": "CVE-2022-0002",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0002"
},
{
"name": "CVE-2023-27462",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-27462"
},
{
"name": "CVE-2022-1016",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1016"
},
{
"name": "CVE-2022-1975",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1975"
},
{
"name": "CVE-2022-23038",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-23038"
},
{
"name": "CVE-2023-27309",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-27309"
},
{
"name": "CVE-2018-25032",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-25032"
},
{
"name": "CVE-2022-0494",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0494"
},
{
"name": "CVE-2021-42379",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-42379"
},
{
"name": "CVE-2022-23039",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-23039"
},
{
"name": "CVE-2021-42381",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-42381"
},
{
"name": "CVE-2022-23040",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-23040"
},
{
"name": "CVE-2022-1304",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1304"
},
{
"name": "CVE-2022-1011",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1011"
},
{
"name": "CVE-2021-26401",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-26401"
},
{
"name": "CVE-2022-0547",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0547"
},
{
"name": "CVE-2021-42383",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-42383"
},
{
"name": "CVE-2022-23041",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-23041"
},
{
"name": "CVE-2022-1734",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1734"
},
{
"name": "CVE-2022-4450",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-4450"
},
{
"name": "CVE-2022-32205",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32205"
},
{
"name": "CVE-2022-32981",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32981"
},
{
"name": "CVE-2022-26490",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-26490"
},
{
"name": "CVE-2022-36946",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-36946"
},
{
"name": "CVE-2022-0001",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0001"
},
{
"name": "CVE-2021-42385",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-42385"
},
{
"name": "CVE-2022-23308",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-23308"
},
{
"name": "CVE-2022-36879",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-36879"
},
{
"name": "CVE-2022-1353",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1353"
},
{
"name": "CVE-2022-2588",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2588"
},
{
"name": "CVE-2019-1073",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-1073"
},
{
"name": "CVE-2022-32206",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32206"
},
{
"name": "CVE-2022-1729",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1729"
},
{
"name": "CVE-2021-4149",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-4149"
},
{
"name": "CVE-2017-5715",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-5715"
},
{
"name": "CVE-2022-1199",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1199"
},
{
"name": "CVE-2021-42375",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-42375"
},
{
"name": "CVE-2021-4034",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-4034"
},
{
"name": "CVE-2022-28390",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-28390"
},
{
"name": "CVE-2022-33981",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-33981"
},
{
"name": "CVE-2022-1974",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1974"
},
{
"name": "CVE-2023-27310",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-27310"
},
{
"name": "CVE-2022-30065",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-30065"
},
{
"name": "CVE-2022-25311",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-25311"
},
{
"name": "CVE-2022-1516",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1516"
},
{
"name": "CVE-2023-27463",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-27463"
},
{
"name": "CVE-2022-1198",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1198"
},
{
"name": "CVE-2022-20158",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-20158"
}
],
"links": [],
"reference": "CERTFR-2023-AVI-0220",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2023-03-14T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Injection de code indirecte \u00e0 distance (XSS)"
},
{
"description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
},
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
},
{
"description": "\u00c9l\u00e9vation de privil\u00e8ges"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les produits\nSiemens. Certaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer\nune ex\u00e9cution de code arbitraire \u00e0 distance, un d\u00e9ni de service \u00e0\ndistance et un contournement de la politique de s\u00e9curit\u00e9.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits Siemens",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Siemens ssa-419740 du 14 mars 2023",
"url": "https://cert-portal.siemens.com/productcert/html/ssa-419740.html"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Siemens ssa-320629 du 14 mars 2023",
"url": "https://cert-portal.siemens.com/productcert/html/ssa-320629.html"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Siemens ssa-250085 du 14 mars 2023",
"url": "https://cert-portal.siemens.com/productcert/html/ssa-250085.html"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Siemens ssa-203374 du 14 mars 2023",
"url": "https://cert-portal.siemens.com/productcert/html/ssa-203374.html"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Siemens ssa-851884 du 14 mars 2023",
"url": "https://cert-portal.siemens.com/productcert/html/ssa-851884.html"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Siemens ssa-565386 du 14 mars 2023",
"url": "https://cert-portal.siemens.com/productcert/html/ssa-565386.html"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Siemens ssa-260625 du 14 mars 2023",
"url": "https://cert-portal.siemens.com/productcert/html/ssa-260625.html"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Siemens ssa-726834 du 14 mars 2023",
"url": "https://cert-portal.siemens.com/productcert/html/ssa-726834.html"
}
]
}
CERTFR-2025-AVI-0158
Vulnerability from certfr_avis - Published: - Updated:
De multiples vulnérabilités ont été découvertes dans les produits NetApp. Elles permettent à un attaquant de provoquer un déni de service à distance, une atteinte à la confidentialité des données et une atteinte à l'intégrité des données.
Solutions
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
| Vendor | Product | Description | ||
|---|---|---|---|---|
| NetApp | ONTAP tools pour VMware vSphere 10 | ONTAP tools for VMware vSphere 10 versions antérieures à 10.3 | ||
| NetApp | HCI Compute Node (Bootstrap OS) | HCI Compute Node (Bootstrap OS) versions antérieures à 12.8 | ||
| NetApp | SolidFire & HCI Storage Node (Element Software) | SolidFire & HCI Storage Node (Element Software) versions antérieures à 12.8 | ||
| NetApp | SolidFire & HCI Management Node | SolidFire & HCI Management Node versions antérieures à 12.8 |
| Title | Publication Time | Tags | |||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "ONTAP tools for VMware vSphere 10 versions ant\u00e9rieures \u00e0 10.3",
"product": {
"name": "ONTAP tools pour VMware vSphere 10",
"vendor": {
"name": "NetApp",
"scada": false
}
}
},
{
"description": "HCI Compute Node (Bootstrap OS) versions ant\u00e9rieures \u00e0 12.8",
"product": {
"name": "HCI Compute Node (Bootstrap OS)",
"vendor": {
"name": "NetApp",
"scada": false
}
}
},
{
"description": "SolidFire \u0026 HCI Storage Node (Element Software) versions ant\u00e9rieures \u00e0 12.8",
"product": {
"name": "SolidFire \u0026 HCI Storage Node (Element Software)",
"vendor": {
"name": "NetApp",
"scada": false
}
}
},
{
"description": "SolidFire \u0026 HCI Management Node versions ant\u00e9rieures \u00e0 12.8",
"product": {
"name": "SolidFire \u0026 HCI Management Node",
"vendor": {
"name": "NetApp",
"scada": false
}
}
}
],
"affected_systems_content": "",
"content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).",
"cves": [
{
"name": "CVE-2024-24795",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-24795"
},
{
"name": "CVE-2021-42384",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-42384"
},
{
"name": "CVE-2021-42378",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-42378"
},
{
"name": "CVE-2021-42382",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-42382"
},
{
"name": "CVE-2021-42376",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-42376"
},
{
"name": "CVE-2023-38709",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-38709"
},
{
"name": "CVE-2024-51562",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-51562"
},
{
"name": "CVE-2024-27316",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27316"
},
{
"name": "CVE-2022-47629",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-47629"
},
{
"name": "CVE-2021-42373",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-42373"
},
{
"name": "CVE-2021-42377",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-42377"
},
{
"name": "CVE-2021-42386",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-42386"
},
{
"name": "CVE-2022-3515",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3515"
},
{
"name": "CVE-2025-0373",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0373"
},
{
"name": "CVE-2024-51565",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-51565"
},
{
"name": "CVE-2021-42380",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-42380"
},
{
"name": "CVE-2021-42374",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-42374"
},
{
"name": "CVE-2020-16593",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-16593"
},
{
"name": "CVE-2021-42379",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-42379"
},
{
"name": "CVE-2021-42381",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-42381"
},
{
"name": "CVE-2021-42383",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-42383"
},
{
"name": "CVE-2024-51563",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-51563"
},
{
"name": "CVE-2021-42385",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-42385"
},
{
"name": "CVE-2024-51564",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-51564"
},
{
"name": "CVE-2020-16599",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-16599"
},
{
"name": "CVE-2025-0374",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0374"
},
{
"name": "CVE-2021-42375",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-42375"
},
{
"name": "CVE-2025-0662",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0662"
},
{
"name": "CVE-2024-51566",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-51566"
}
],
"links": [],
"reference": "CERTFR-2025-AVI-0158",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2025-02-24T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les produits NetApp. Elles permettent \u00e0 un attaquant de provoquer un d\u00e9ni de service \u00e0 distance, une atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es et une atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es.",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits NetApp",
"vendor_advisories": [
{
"published_at": "2023-07-06",
"title": "Bulletin de s\u00e9curit\u00e9 NetApp NTAP-20230706-0008",
"url": "https://security.netapp.com/advisory/ntap-20230706-0008/"
},
{
"published_at": "2021-01-22",
"title": "Bulletin de s\u00e9curit\u00e9 NetApp NTAP-20210122-0003",
"url": "https://security.netapp.com/advisory/ntap-20210122-0003/"
},
{
"published_at": "2023-03-16",
"title": "Bulletin de s\u00e9curit\u00e9 NetApp NTAP-20230316-0011",
"url": "https://security.netapp.com/advisory/ntap-20230316-0011/"
},
{
"published_at": "2021-12-23",
"title": "Bulletin de s\u00e9curit\u00e9 NetApp NTAP-20211223-0002",
"url": "https://security.netapp.com/advisory/ntap-20211223-0002/"
},
{
"published_at": "2024-04-15",
"title": "Bulletin de s\u00e9curit\u00e9 NetApp NTAP-20240415-0013",
"url": "https://security.netapp.com/advisory/ntap-20240415-0013/"
}
]
}
CERTFR-2023-AVI-0453
Vulnerability from certfr_avis - Published: - Updated:
De multiples vulnérabilités ont été découvertes dans les produits Siemens. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance, un déni de service à distance et un contournement de la politique de sécurité.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Vendor | Product | Description | ||
|---|---|---|---|---|
| Siemens | N/A | SINAMICS GL150 versions antérieures à 7.2 | ||
| Siemens | N/A | Teamcenter Visualization versions 13.3.x antérieures à 13.3.0.10 | ||
| Siemens | N/A | SIMOTION D425-2 DP (6AU1425-2AA00-0AA0) versions antérieures à 5.5 SP1 | ||
| Siemens | N/A | CP-8050 MASTER MODULE (6MF2805-0AA00) versions antérieures à CPCI85 V05 | ||
| Siemens | N/A | POWER METER SICAM Q200 family versions antérieures à 2.70 | ||
| Siemens | N/A | SIMATIC NET PC Software V15 toutes versions | ||
| Siemens | N/A | SIMOTION D445-2 DP/PN (6AU1445-2AD00-0AA1) toutes versions | ||
| Siemens | N/A | SIMOTION D410-2 DP (6AU1410-2AA00-0AA0) versions antérieures à 5.5 SP1 | ||
| Siemens | N/A | SIMATIC STEP 7 V5 versions antérieures à 5.7 | ||
| Siemens | N/A | SIMOTION C240 (6AU1240-1AA00-0AA0) versions antérieures à 5.5 SP1 | ||
| Siemens | N/A | SIMATIC S7-1500 TM MFP - Linux Kernel | ||
| Siemens | N/A | SINAUT Software ST7sc toutes versions | ||
| Siemens | N/A | SIMOTION P320-4 E (6AU1320-4DE65-3AF0) toutes versions | ||
| Siemens | N/A | Teamcenter Visualization versions 14.0.x antérieures à 14.0.0.6 | ||
| Siemens | N/A | SIMOTION C240 PN (6AU1240-1AB00-0AA0) versions antérieures à 5.5 SP1 | ||
| Siemens | N/A | SIMATIC NET PC Software V14 toutes versions | ||
| Siemens | N/A | SIMATIC PCS 7 V9.0 toutes versions | ||
| Siemens | N/A | SIMATIC PCS 7 V9.1 toutes versions | ||
| Siemens | N/A | SIMATIC S7-1500 TM MFP - BIOS | ||
| Siemens | N/A | SIMOTION D435-2 DP/PN (6AU1435-2AD00-0AA0) versions antérieures à 5.5 SP1 | ||
| Siemens | N/A | SINAMICS SL150 versions antérieures à 7.2 | ||
| Siemens | N/A | SINAMICS PERFECT HARMONY GH180 6SR5 versions antérieures à 7.2 | ||
| Siemens | N/A | Teamcenter Visualization versions 13.2.x antérieures à 13.2.0.13 | ||
| Siemens | N/A | SIMOTION D435-2 DP (6AU1435-2AA00-0AA0) versions antérieures à 5.5 SP1 | ||
| Siemens | N/A | SIMOTION P320-4 S (6AU1320-4DS66-3AG0) toutes versions | ||
| Siemens | N/A | SIMATIC WinCC versions antérieures à 8.0 | ||
| Siemens | N/A | Teamcenter Visualization versions 14.2.x antérieures à 14.2.0.3 | ||
| Siemens | N/A | les contrôlleurs Desigo PX, se référer au bulletin ssa-824231 de l'éditeur pour la liste complète des versions affectées | ||
| Siemens | N/A | SIMOTION D445-2 DP/PN (6AU1445-2AD00-0AA0) versions antérieures à 5.5 SP1 | ||
| Siemens | N/A | SIMATIC S7-PM toutes versions | ||
| Siemens | N/A | Solid Edge SE2023 versions antérieures à 223.0 Update 5 | ||
| Siemens | N/A | JT2Go versions antérieures à 14.1.0.4 | ||
| Siemens | N/A | SIMOTION D455-2 DP/PN (6AU1455-2AD00-0AA0) versions antérieures à 5.5 SP1 | ||
| Siemens | N/A | SIMOTION D410-2 DP/PN (6AU1410-2AD00-0AA0) versions antérieures à 5.5 SP1 | ||
| Siemens | N/A | Teamcenter Visualization versions 14.1.x antérieures à 14.1.0.8 | ||
| Siemens | N/A | CP-8031 MASTER MODULE (6MF2803-1AA00) versions antérieures à CPCI85 V05 | ||
| Siemens | N/A | Totally Integrated Automation Portal (TIA Portal) versions 14 à 18 | ||
| Siemens | N/A | SIMATIC PCS 7 toutes versions | ||
| Siemens | N/A | SIMOTION D425-2 DP/PN (6AU1425-2AD00-0AA0) versions antérieures à 5.5 SP1 |
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "SINAMICS GL150 versions ant\u00e9rieures \u00e0 7.2",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "Teamcenter Visualization versions 13.3.x ant\u00e9rieures \u00e0 13.3.0.10",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMOTION D425-2 DP (6AU1425-2AA00-0AA0) versions ant\u00e9rieures \u00e0 5.5 SP1",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "CP-8050 MASTER MODULE (6MF2805-0AA00) versions ant\u00e9rieures \u00e0 CPCI85 V05",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "POWER METER SICAM Q200 family versions ant\u00e9rieures \u00e0 2.70",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMATIC NET PC Software V15 toutes versions",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMOTION D445-2 DP/PN (6AU1445-2AD00-0AA1) toutes versions",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMOTION D410-2 DP (6AU1410-2AA00-0AA0) versions ant\u00e9rieures \u00e0 5.5 SP1",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMATIC STEP 7 V5 versions ant\u00e9rieures \u00e0 5.7",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMOTION C240 (6AU1240-1AA00-0AA0) versions ant\u00e9rieures \u00e0 5.5 SP1",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMATIC S7-1500 TM MFP - Linux Kernel",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SINAUT Software ST7sc toutes versions",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMOTION P320-4 E (6AU1320-4DE65-3AF0) toutes versions",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "Teamcenter Visualization versions 14.0.x ant\u00e9rieures \u00e0 14.0.0.6",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMOTION C240 PN (6AU1240-1AB00-0AA0) versions ant\u00e9rieures \u00e0 5.5 SP1",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMATIC NET PC Software V14 toutes versions",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMATIC PCS 7 V9.0 toutes versions",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMATIC PCS 7 V9.1 toutes versions",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMATIC S7-1500 TM MFP - BIOS",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMOTION D435-2 DP/PN (6AU1435-2AD00-0AA0) versions ant\u00e9rieures \u00e0 5.5 SP1",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SINAMICS SL150 versions ant\u00e9rieures \u00e0 7.2",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SINAMICS PERFECT HARMONY GH180 6SR5 versions ant\u00e9rieures \u00e0 7.2",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "Teamcenter Visualization versions 13.2.x ant\u00e9rieures \u00e0 13.2.0.13",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMOTION D435-2 DP (6AU1435-2AA00-0AA0) versions ant\u00e9rieures \u00e0 5.5 SP1",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMOTION P320-4 S (6AU1320-4DS66-3AG0) toutes versions",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMATIC WinCC versions ant\u00e9rieures \u00e0 8.0",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "Teamcenter Visualization versions 14.2.x ant\u00e9rieures \u00e0 14.2.0.3",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "les contr\u00f4lleurs Desigo PX, se r\u00e9f\u00e9rer au bulletin ssa-824231 de l\u0027\u00e9diteur pour la liste compl\u00e8te des versions affect\u00e9es",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMOTION D445-2 DP/PN (6AU1445-2AD00-0AA0) versions ant\u00e9rieures \u00e0 5.5 SP1",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMATIC S7-PM toutes versions",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "Solid Edge SE2023 versions ant\u00e9rieures \u00e0 223.0 Update 5",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "JT2Go versions ant\u00e9rieures \u00e0 14.1.0.4",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMOTION D455-2 DP/PN (6AU1455-2AD00-0AA0) versions ant\u00e9rieures \u00e0 5.5 SP1",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMOTION D410-2 DP/PN (6AU1410-2AD00-0AA0) versions ant\u00e9rieures \u00e0 5.5 SP1",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "Teamcenter Visualization versions 14.1.x ant\u00e9rieures \u00e0 14.1.0.8",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "CP-8031 MASTER MODULE (6MF2803-1AA00) versions ant\u00e9rieures \u00e0 CPCI85 V05",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "Totally Integrated Automation Portal (TIA Portal) versions 14 \u00e0 18",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMATIC PCS 7 toutes versions",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMOTION D425-2 DP/PN (6AU1425-2AD00-0AA0) versions ant\u00e9rieures \u00e0 5.5 SP1",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2019-25013",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-25013"
},
{
"name": "CVE-2022-1343",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1343"
},
{
"name": "CVE-2021-42384",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-42384"
},
{
"name": "CVE-2022-35252",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-35252"
},
{
"name": "CVE-2022-1473",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1473"
},
{
"name": "CVE-2021-42378",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-42378"
},
{
"name": "CVE-2022-39190",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-39190"
},
{
"name": "CVE-2022-42720",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-42720"
},
{
"name": "CVE-2021-42382",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-42382"
},
{
"name": "CVE-2022-47520",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-47520"
},
{
"name": "CVE-2021-38604",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-38604"
},
{
"name": "CVE-2022-21233",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21233"
},
{
"name": "CVE-2021-42376",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-42376"
},
{
"name": "CVE-2022-3633",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3633"
},
{
"name": "CVE-2021-28831",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-28831"
},
{
"name": "CVE-2023-23454",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-23454"
},
{
"name": "CVE-2022-4304",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-4304"
},
{
"name": "CVE-2020-29562",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-29562"
},
{
"name": "CVE-2022-20421",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-20421"
},
{
"name": "CVE-2022-32208",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32208"
},
{
"name": "CVE-2018-4834",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-4834"
},
{
"name": "CVE-2022-32296",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32296"
},
{
"name": "CVE-2022-47929",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-47929"
},
{
"name": "CVE-2022-3628",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3628"
},
{
"name": "CVE-2021-42373",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-42373"
},
{
"name": "CVE-2022-1292",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1292"
},
{
"name": "CVE-2021-42377",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-42377"
},
{
"name": "CVE-2022-42329",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-42329"
},
{
"name": "CVE-2021-3998",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3998"
},
{
"name": "CVE-2023-23455",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-23455"
},
{
"name": "CVE-2020-1752",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-1752"
},
{
"name": "CVE-2022-42703",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-42703"
},
{
"name": "CVE-2022-47518",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-47518"
},
{
"name": "CVE-2023-31238",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-31238"
},
{
"name": "CVE-2022-32207",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32207"
},
{
"name": "CVE-2023-0215",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0215"
},
{
"name": "CVE-2023-0286",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0286"
},
{
"name": "CVE-2021-42386",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-42386"
},
{
"name": "CVE-2022-42895",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-42895"
},
{
"name": "CVE-2023-33919",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-33919"
},
{
"name": "CVE-2022-43750",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-43750"
},
{
"name": "CVE-2022-21166",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21166"
},
{
"name": "CVE-2022-3435",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3435"
},
{
"name": "CVE-2022-3169",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3169"
},
{
"name": "CVE-2022-2068",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2068"
},
{
"name": "CVE-2021-42380",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-42380"
},
{
"name": "CVE-2023-33920",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-33920"
},
{
"name": "CVE-2023-0466",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0466"
},
{
"name": "CVE-2023-0465",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0465"
},
{
"name": "CVE-2022-4662",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-4662"
},
{
"name": "CVE-2021-42374",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-42374"
},
{
"name": "CVE-2023-33124",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-33124"
},
{
"name": "CVE-2022-43545",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-43545"
},
{
"name": "CVE-2022-3564",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3564"
},
{
"name": "CVE-2022-3534",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3534"
},
{
"name": "CVE-2022-36280",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-36280"
},
{
"name": "CVE-2022-4129",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-4129"
},
{
"name": "CVE-2022-41218",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41218"
},
{
"name": "CVE-2023-26495",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-26495"
},
{
"name": "CVE-2022-34918",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-34918"
},
{
"name": "CVE-2022-20572",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-20572"
},
{
"name": "CVE-2022-41849",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41849"
},
{
"name": "CVE-2022-42432",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-42432"
},
{
"name": "CVE-2022-42896",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-42896"
},
{
"name": "CVE-2023-0179",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0179"
},
{
"name": "CVE-2022-47946",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-47946"
},
{
"name": "CVE-2021-33655",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33655"
},
{
"name": "CVE-2022-2602",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2602"
},
{
"name": "CVE-2022-1462",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1462"
},
{
"name": "CVE-2023-25910",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-25910"
},
{
"name": "CVE-2023-33921",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-33921"
},
{
"name": "CVE-2022-4095",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-4095"
},
{
"name": "CVE-2022-2585",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2585"
},
{
"name": "CVE-2023-0464",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0464"
},
{
"name": "CVE-2022-21125",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21125"
},
{
"name": "CVE-2022-2078",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2078"
},
{
"name": "CVE-2022-1184",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1184"
},
{
"name": "CVE-2022-41222",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41222"
},
{
"name": "CVE-2022-2663",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2663"
},
{
"name": "CVE-2022-2586",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2586"
},
{
"name": "CVE-2022-28391",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-28391"
},
{
"name": "CVE-2023-26607",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-26607"
},
{
"name": "CVE-2022-3649",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3649"
},
{
"name": "CVE-2022-3545",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3545"
},
{
"name": "CVE-2020-10029",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-10029"
},
{
"name": "CVE-2022-42719",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-42719"
},
{
"name": "CVE-2018-25032",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-25032"
},
{
"name": "CVE-2021-42379",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-42379"
},
{
"name": "CVE-2021-20269",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-20269"
},
{
"name": "CVE-2021-3999",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3999"
},
{
"name": "CVE-2021-3759",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3759"
},
{
"name": "CVE-2023-23559",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-23559"
},
{
"name": "CVE-2022-3524",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3524"
},
{
"name": "CVE-2022-32250",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32250"
},
{
"name": "CVE-2022-2274",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2274"
},
{
"name": "CVE-2018-13405",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-13405"
},
{
"name": "CVE-2022-39188",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-39188"
},
{
"name": "CVE-2021-42381",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-42381"
},
{
"name": "CVE-2022-21505",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21505"
},
{
"name": "CVE-2022-36123",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-36123"
},
{
"name": "CVE-2022-3586",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3586"
},
{
"name": "CVE-2021-4037",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-4037"
},
{
"name": "CVE-2022-41850",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41850"
},
{
"name": "CVE-2022-2978",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2978"
},
{
"name": "CVE-2022-3646",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3646"
},
{
"name": "CVE-2022-3625",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3625"
},
{
"name": "CVE-2022-42328",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-42328"
},
{
"name": "CVE-2022-3565",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3565"
},
{
"name": "CVE-2023-33122",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-33122"
},
{
"name": "CVE-2022-42721",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-42721"
},
{
"name": "CVE-2022-4378",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-4378"
},
{
"name": "CVE-2022-0547",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0547"
},
{
"name": "CVE-2022-21123",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21123"
},
{
"name": "CVE-2022-43398",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-43398"
},
{
"name": "CVE-2022-1012",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1012"
},
{
"name": "CVE-2022-3115",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3115"
},
{
"name": "CVE-2021-42383",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-42383"
},
{
"name": "CVE-2023-1095",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-1095"
},
{
"name": "CVE-2022-4450",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-4450"
},
{
"name": "CVE-2022-0171",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0171"
},
{
"name": "CVE-2022-26373",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-26373"
},
{
"name": "CVE-2022-2905",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2905"
},
{
"name": "CVE-2022-20422",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-20422"
},
{
"name": "CVE-2023-0394",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0394"
},
{
"name": "CVE-2022-32205",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32205"
},
{
"name": "CVE-2022-3594",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3594"
},
{
"name": "CVE-2022-36946",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-36946"
},
{
"name": "CVE-2022-3303",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3303"
},
{
"name": "CVE-2016-10228",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-10228"
},
{
"name": "CVE-2021-42385",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-42385"
},
{
"name": "CVE-2022-23308",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-23308"
},
{
"name": "CVE-2022-1679",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1679"
},
{
"name": "CVE-2022-36879",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-36879"
},
{
"name": "CVE-2022-23218",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-23218"
},
{
"name": "CVE-2023-27465",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-27465"
},
{
"name": "CVE-2022-3629",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3629"
},
{
"name": "CVE-2023-33121",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-33121"
},
{
"name": "CVE-2022-2959",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2959"
},
{
"name": "CVE-2023-28829",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-28829"
},
{
"name": "CVE-2022-2588",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2588"
},
{
"name": "CVE-2022-2097",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2097"
},
{
"name": "CVE-2022-32206",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32206"
},
{
"name": "CVE-2023-1077",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-1077"
},
{
"name": "CVE-2021-35942",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35942"
},
{
"name": "CVE-2023-1073",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-1073"
},
{
"name": "CVE-2023-30757",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-30757"
},
{
"name": "CVE-2021-33574",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33574"
},
{
"name": "CVE-2022-42722",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-42722"
},
{
"name": "CVE-2021-3326",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3326"
},
{
"name": "CVE-2022-20566",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-20566"
},
{
"name": "CVE-2022-2327",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2327"
},
{
"name": "CVE-2022-1199",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1199"
},
{
"name": "CVE-2022-3621",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3621"
},
{
"name": "CVE-2022-1434",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1434"
},
{
"name": "CVE-2022-3606",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3606"
},
{
"name": "CVE-2022-1852",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1852"
},
{
"name": "CVE-2021-27645",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-27645"
},
{
"name": "CVE-2022-40768",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-40768"
},
{
"name": "CVE-2022-4139",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-4139"
},
{
"name": "CVE-2022-3521",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3521"
},
{
"name": "CVE-2022-3104",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3104"
},
{
"name": "CVE-2021-42375",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-42375"
},
{
"name": "CVE-2022-2503",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2503"
},
{
"name": "CVE-2022-3028",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3028"
},
{
"name": "CVE-2023-0590",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0590"
},
{
"name": "CVE-2023-30897",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-30897"
},
{
"name": "CVE-2022-40307",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-40307"
},
{
"name": "CVE-2020-27618",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-27618"
},
{
"name": "CVE-2022-23219",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-23219"
},
{
"name": "CVE-2022-30065",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-30065"
},
{
"name": "CVE-2022-41674",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41674"
},
{
"name": "CVE-2022-1882",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1882"
},
{
"name": "CVE-2022-3635",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3635"
},
{
"name": "CVE-2022-43439",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-43439"
},
{
"name": "CVE-2023-33123",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-33123"
},
{
"name": "CVE-2023-30901",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-30901"
},
{
"name": "CVE-2022-43546",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-43546"
},
{
"name": "CVE-2022-2153",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2153"
}
],
"links": [],
"reference": "CERTFR-2023-AVI-0453",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2023-06-13T00:00:00.000000"
},
{
"description": "Modification de la date du bulletin de s\u00e9curit\u00e9 ssa-824231.",
"revision_date": "2023-06-14T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
},
{
"description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
},
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
},
{
"description": "\u00c9l\u00e9vation de privil\u00e8ges"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les produits\nSiemens. Certaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer\nune ex\u00e9cution de code arbitraire \u00e0 distance, un d\u00e9ni de service \u00e0\ndistance et un contournement de la politique de s\u00e9curit\u00e9.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits Siemens",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Siemens ssa-975766 du 13 juin 2023",
"url": "https://cert-portal.siemens.com/productcert/html/ssa-975766.html"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Siemens ssa-042050 du 13 juin 2023",
"url": "https://cert-portal.siemens.com/productcert/html/ssa-042050.html"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Siemens ssa-731916 du 13 juin 2023",
"url": "https://cert-portal.siemens.com/productcert/html/ssa-731916.html"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Siemens ssa-914026 du 13 juin 2023",
"url": "https://cert-portal.siemens.com/productcert/html/ssa-914026.html"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Siemens ssa-794697 du 13 juin 2023",
"url": "https://cert-portal.siemens.com/productcert/html/ssa-794697.html"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Siemens ssa-538795 du 13 juin 2023",
"url": "https://cert-portal.siemens.com/productcert/html/ssa-538795.html"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Siemens ssa-831302 du 13 juin 2023",
"url": "https://cert-portal.siemens.com/productcert/html/ssa-831302.html"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Siemens ssa-482956 du 13 juin 2023",
"url": "https://cert-portal.siemens.com/productcert/html/ssa-482956.html"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Siemens ssa-508677 du 13 juin 2023",
"url": "https://cert-portal.siemens.com/productcert/html/ssa-508677.html"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Siemens ssa-968170 du 13 juin 2023",
"url": "https://cert-portal.siemens.com/productcert/html/ssa-968170.html"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Siemens ssa-824231 du 24 janvier 2018",
"url": "https://cert-portal.siemens.com/productcert/html/ssa-824231.html"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Siemens ssa-942865 du 13 juin 2023",
"url": "https://cert-portal.siemens.com/productcert/html/ssa-942865.html"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Siemens ssa-887249 du 13 juin 2023",
"url": "https://cert-portal.siemens.com/productcert/html/ssa-887249.html"
}
]
}
CERTFR-2026-AVI-0199
Vulnerability from certfr_avis - Published: 2026-02-24 - Updated: 2026-02-24
De multiples vulnérabilités ont été découvertes dans les produits VMware. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance, une élévation de privilèges et une injection de code indirecte à distance (XSS).
Solutions
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
| Vendor | Product | Description | ||
|---|---|---|---|---|
| VMware | Telco Cloud Platform | Telco Cloud Platform versions 4.x et 5.x sans le correctif de sécurité KB428241 | ||
| VMware | Tanzu Data Services | Tanzu Data Flow versions antérieures à 2.0.2 sur Tanzu Platform | ||
| VMware | Azure Spring Enterprise | Harbor Registry versions antérieures à 2.14.2 | ||
| VMware | Tanzu Data Intelligence | Tanzu pour MySQL versions 2.0.0 sur Kubernetes | ||
| VMware | Cloud Foundation | Cloud Foundation versions 9.x antérieures à 9.0.2.0 | ||
| VMware | Tanzu Kubernetes Runtime | App Metrics versions antérieures à2.3.3 | ||
| VMware | Tanzu Data Intelligence | Tanzu GemFire versions antérieures à 2.6.1 sur Kubernetes | ||
| VMware | Tanzu Kubernetes Runtime | CredHub Secrets Management pour Tanzu Platform versions antérieures à 1.6.8 | ||
| VMware | Tanzu Data Intelligence | Tanzu pour Valkey version 3.3.1 sur Kubernetes | ||
| VMware | Tanzu Operations Manager | Foundation Core pour Tanzu Platform versions antérieures à 3.2.4 | ||
| VMware | Aria Operations | Aria Operations versions 8.x antérieures à 8.18.6 | ||
| VMware | Tanzu Kubernetes Runtime | cf-mgmt pour Tanzu Platform versions antérieures à 1.0.108 | ||
| VMware | Tanzu Data Intelligence | Tanzu pour Valkey version 9.0.1 | ||
| VMware | Tanzu Kubernetes Runtime | Extended App Support pour Tanzu Platform versions antérieures à 1.0.15 | ||
| VMware | Tanzu Data Intelligence | Tanzu GemFire Management versions antérieures à 1.4.3 | ||
| VMware | Tanzu Kubernetes Runtime | NodeJS Buildpack versions antérieures à 1.8.77 | ||
| VMware | Tanzu Kubernetes Runtime | Cloud Native Buildpacks pour Tanzu Platform versions antérieures à 0.6.5 | ||
| VMware | Cloud Foundation | Cloud Foundation versions 4.x et 5.x sans le correctif de sécurité KB92148 | ||
| VMware | Tanzu Kubernetes Runtime | AI Services pour Tanzu Platform versions antérieures à 10.3.4 | ||
| VMware | Tanzu Kubernetes Runtime | Java Buildpack versions antérieures à 4.89.0 | ||
| VMware | Telco Cloud Infrastructure | Telco Cloud Infrastructure versions 2.x et 3.x sans le correctif de sécurité KB428241 | ||
| VMware | Tanzu Kubernetes Runtime | Elastic Application Runtime pour Tanzu Platform versions antérieures à 6.0.25+LTS-T, 10.2.8+LTS-T et 10.3.5 |
| Title | Publication Time | Tags | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Telco Cloud Platform versions 4.x et 5.x sans le correctif de s\u00e9curit\u00e9 KB428241",
"product": {
"name": "Telco Cloud Platform",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Tanzu Data Flow versions ant\u00e9rieures \u00e0 2.0.2 sur Tanzu Platform",
"product": {
"name": "Tanzu Data Services",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Harbor Registry versions ant\u00e9rieures \u00e0 2.14.2",
"product": {
"name": "Azure Spring Enterprise",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Tanzu pour MySQL versions 2.0.0 sur Kubernetes",
"product": {
"name": "Tanzu Data Intelligence",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Cloud Foundation versions 9.x ant\u00e9rieures \u00e0 9.0.2.0",
"product": {
"name": "Cloud Foundation",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "App Metrics versions ant\u00e9rieures \u00e02.3.3",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Tanzu GemFire versions ant\u00e9rieures \u00e0 2.6.1 sur Kubernetes",
"product": {
"name": "Tanzu Data Intelligence",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "CredHub Secrets Management pour Tanzu Platform versions ant\u00e9rieures \u00e0 1.6.8",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Tanzu pour Valkey version 3.3.1 sur Kubernetes",
"product": {
"name": "Tanzu Data Intelligence",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Foundation Core pour Tanzu Platform versions ant\u00e9rieures \u00e0 3.2.4",
"product": {
"name": "Tanzu Operations Manager",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Aria Operations versions 8.x ant\u00e9rieures \u00e0 8.18.6",
"product": {
"name": "Aria Operations",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "cf-mgmt pour Tanzu Platform versions ant\u00e9rieures \u00e0 1.0.108",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Tanzu pour Valkey version 9.0.1",
"product": {
"name": "Tanzu Data Intelligence",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Extended App Support pour Tanzu Platform versions ant\u00e9rieures \u00e0 1.0.15",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Tanzu GemFire Management versions ant\u00e9rieures \u00e0 1.4.3",
"product": {
"name": "Tanzu Data Intelligence",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "NodeJS Buildpack versions ant\u00e9rieures \u00e0 1.8.77",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Cloud Native Buildpacks pour Tanzu Platform versions ant\u00e9rieures \u00e0 0.6.5",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Cloud Foundation versions 4.x et 5.x sans le correctif de s\u00e9curit\u00e9 KB92148",
"product": {
"name": "Cloud Foundation",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "AI Services pour Tanzu Platform versions ant\u00e9rieures \u00e0 10.3.4",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Java Buildpack versions ant\u00e9rieures \u00e0 4.89.0",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Telco Cloud Infrastructure versions 2.x et 3.x sans le correctif de s\u00e9curit\u00e9 KB428241",
"product": {
"name": "Telco Cloud Infrastructure",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Elastic Application Runtime pour Tanzu Platform versions ant\u00e9rieures \u00e0 6.0.25+LTS-T, 10.2.8+LTS-T et 10.3.5",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
}
],
"affected_systems_content": "",
"content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).",
"cves": [
{
"name": "CVE-2025-6395",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6395"
},
{
"name": "CVE-2022-1343",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1343"
},
{
"name": "CVE-2024-24790",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-24790"
},
{
"name": "CVE-2025-47219",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-47219"
},
{
"name": "CVE-2021-22898",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-22898"
},
{
"name": "CVE-2021-3996",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3996"
},
{
"name": "CVE-2021-42384",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-42384"
},
{
"name": "CVE-2023-0216",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0216"
},
{
"name": "CVE-2025-31651",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-31651"
},
{
"name": "CVE-2024-20919",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-20919"
},
{
"name": "CVE-2022-35252",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-35252"
},
{
"name": "CVE-2022-1473",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1473"
},
{
"name": "CVE-2023-21938",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21938"
},
{
"name": "CVE-2025-61730",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61730"
},
{
"name": "CVE-2022-32189",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32189"
},
{
"name": "CVE-2017-16544",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-16544"
},
{
"name": "CVE-2025-39987",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39987"
},
{
"name": "CVE-2021-42378",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-42378"
},
{
"name": "CVE-2023-0401",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0401"
},
{
"name": "CVE-2025-21861",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21861"
},
{
"name": "CVE-2026-21933",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-21933"
},
{
"name": "CVE-2025-58183",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-58183"
},
{
"name": "CVE-2023-21843",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21843"
},
{
"name": "CVE-2026-21932",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-21932"
},
{
"name": "CVE-2022-24450",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-24450"
},
{
"name": "CVE-2025-66199",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-66199"
},
{
"name": "CVE-2025-15282",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-15282"
},
{
"name": "CVE-2024-21235",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21235"
},
{
"name": "CVE-2024-9681",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-9681"
},
{
"name": "CVE-2021-37600",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-37600"
},
{
"name": "CVE-2021-42382",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-42382"
},
{
"name": "CVE-2020-10750",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-10750"
},
{
"name": "CVE-2025-68973",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68973"
},
{
"name": "CVE-2022-30631",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-30631"
},
{
"name": "CVE-2023-46218",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-46218"
},
{
"name": "CVE-2025-40055",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40055"
},
{
"name": "CVE-2021-42376",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-42376"
},
{
"name": "CVE-2025-9714",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-9714"
},
{
"name": "CVE-2026-22801",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-22801"
},
{
"name": "CVE-2025-39876",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39876"
},
{
"name": "CVE-2025-40029",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40029"
},
{
"name": "CVE-2025-38561",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38561"
},
{
"name": "CVE-2025-10148",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-10148"
},
{
"name": "CVE-2023-28841",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-28841"
},
{
"name": "CVE-2023-28840",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-28840"
},
{
"name": "CVE-2025-40048",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40048"
},
{
"name": "CVE-2022-27191",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-27191"
},
{
"name": "CVE-2025-40219",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40219"
},
{
"name": "CVE-2024-21144",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21144"
},
{
"name": "CVE-2025-40043",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40043"
},
{
"name": "CVE-2020-8169",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-8169"
},
{
"name": "CVE-2021-41091",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-41091"
},
{
"name": "CVE-2022-27781",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-27781"
},
{
"name": "CVE-2021-22925",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-22925"
},
{
"name": "CVE-2025-8556",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8556"
},
{
"name": "CVE-2026-21936",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-21936"
},
{
"name": "CVE-2025-59775",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-59775"
},
{
"name": "CVE-2026-21937",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-21937"
},
{
"name": "CVE-2025-39973",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39973"
},
{
"name": "CVE-2025-22872",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22872"
},
{
"name": "CVE-2025-8941",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8941"
},
{
"name": "CVE-2025-66614",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-66614"
},
{
"name": "CVE-2018-1000517",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1000517"
},
{
"name": "CVE-2025-15469",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-15469"
},
{
"name": "CVE-2025-39943",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39943"
},
{
"name": "CVE-2025-39945",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39945"
},
{
"name": "CVE-2025-39883",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39883"
},
{
"name": "CVE-2023-29404",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-29404"
},
{
"name": "CVE-2023-21954",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21954"
},
{
"name": "CVE-2022-4304",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-4304"
},
{
"name": "CVE-2023-21939",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21939"
},
{
"name": "CVE-2022-0563",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0563"
},
{
"name": "CVE-2024-20926",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-20926"
},
{
"name": "CVE-2025-0913",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0913"
},
{
"name": "CVE-2025-40019",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40019"
},
{
"name": "CVE-2025-40240",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40240"
},
{
"name": "CVE-2022-24921",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-24921"
},
{
"name": "CVE-2022-32208",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32208"
},
{
"name": "CVE-2022-28327",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-28327"
},
{
"name": "CVE-2025-40081",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40081"
},
{
"name": "CVE-2025-47907",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-47907"
},
{
"name": "CVE-2024-58011",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58011"
},
{
"name": "CVE-2025-12084",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-12084"
},
{
"name": "CVE-2025-40026",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40026"
},
{
"name": "CVE-2025-40153",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40153"
},
{
"name": "CVE-2022-1292",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1292"
},
{
"name": "CVE-2023-45283",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45283"
},
{
"name": "CVE-2025-40121",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40121"
},
{
"name": "CVE-2026-1642",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-1642"
},
{
"name": "CVE-2025-45582",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-45582"
},
{
"name": "CVE-2024-21068",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21068"
},
{
"name": "CVE-2025-55753",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55753"
},
{
"name": "CVE-2025-11468",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-11468"
},
{
"name": "CVE-2025-40204",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40204"
},
{
"name": "CVE-2025-40171",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40171"
},
{
"name": "CVE-2021-43816",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-43816"
},
{
"name": "CVE-2023-45288",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45288"
},
{
"name": "CVE-2025-6069",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6069"
},
{
"name": "CVE-2023-3817",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-3817"
},
{
"name": "CVE-2025-39911",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39911"
},
{
"name": "CVE-2025-69419",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-69419"
},
{
"name": "CVE-2025-6052",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6052"
},
{
"name": "CVE-2022-41725",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41725"
},
{
"name": "CVE-2025-10543",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-10543"
},
{
"name": "CVE-2025-40125",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40125"
},
{
"name": "CVE-2025-40349",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40349"
},
{
"name": "CVE-2025-6075",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6075"
},
{
"name": "CVE-2019-5481",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-5481"
},
{
"name": "CVE-2025-26646",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-26646"
},
{
"name": "CVE-2022-30635",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-30635"
},
{
"name": "CVE-2022-29222",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-29222"
},
{
"name": "CVE-2025-40187",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40187"
},
{
"name": "CVE-2025-58185",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-58185"
},
{
"name": "CVE-2022-41715",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41715"
},
{
"name": "CVE-2024-21012",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21012"
},
{
"name": "CVE-2025-39913",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39913"
},
{
"name": "CVE-2022-32207",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32207"
},
{
"name": "CVE-2025-40092",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40092"
},
{
"name": "CVE-2022-41722",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41722"
},
{
"name": "CVE-2025-61731",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61731"
},
{
"name": "CVE-2023-0215",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0215"
},
{
"name": "CVE-2025-39967",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39967"
},
{
"name": "CVE-2025-40115",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40115"
},
{
"name": "CVE-2023-0286",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0286"
},
{
"name": "CVE-2021-42386",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-42386"
},
{
"name": "CVE-2024-47561",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47561"
},
{
"name": "CVE-2023-45285",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45285"
},
{
"name": "CVE-2025-13837",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-13837"
},
{
"name": "CVE-2025-55752",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55752"
},
{
"name": "CVE-2024-24783",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-24783"
},
{
"name": "CVE-2023-45284",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45284"
},
{
"name": "CVE-2025-39949",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39949"
},
{
"name": "CVE-2023-29403",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-29403"
},
{
"name": "CVE-2022-27776",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-27776"
},
{
"name": "CVE-2022-29190",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-29190"
},
{
"name": "CVE-2025-40173",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40173"
},
{
"name": "CVE-2024-24791",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-24791"
},
{
"name": "CVE-2024-20921",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-20921"
},
{
"name": "CVE-2022-42916",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-42916"
},
{
"name": "CVE-2022-28948",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-28948"
},
{
"name": "CVE-2025-58767",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-58767"
},
{
"name": "CVE-2024-56538",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56538"
},
{
"name": "CVE-2025-39923",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39923"
},
{
"name": "CVE-2023-4807",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4807"
},
{
"name": "CVE-2025-15367",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-15367"
},
{
"name": "CVE-2022-31030",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-31030"
},
{
"name": "CVE-2024-45341",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45341"
},
{
"name": "CVE-2018-20679",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-20679"
},
{
"name": "CVE-2024-13176",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-13176"
},
{
"name": "CVE-2025-39953",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39953"
},
{
"name": "CVE-2025-15467",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-15467"
},
{
"name": "CVE-2023-2253",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2253"
},
{
"name": "CVE-2024-58251",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58251"
},
{
"name": "CVE-2026-2006",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-2006"
},
{
"name": "CVE-2022-21624",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21624"
},
{
"name": "CVE-2023-28322",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-28322"
},
{
"name": "CVE-2023-34462",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-34462"
},
{
"name": "CVE-2025-40167",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40167"
},
{
"name": "CVE-2023-29405",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-29405"
},
{
"name": "CVE-2021-38297",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-38297"
},
{
"name": "CVE-2025-39969",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39969"
},
{
"name": "CVE-2025-4598",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4598"
},
{
"name": "CVE-2025-27144",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-27144"
},
{
"name": "CVE-2017-15873",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-15873"
},
{
"name": "CVE-2022-30629",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-30629"
},
{
"name": "CVE-2025-40194",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40194"
},
{
"name": "CVE-2025-40245",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40245"
},
{
"name": "CVE-2023-44487",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-44487"
},
{
"name": "CVE-2023-5363",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-5363"
},
{
"name": "CVE-2024-24557",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-24557"
},
{
"name": "CVE-2023-45289",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45289"
},
{
"name": "CVE-2022-2068",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2068"
},
{
"name": "CVE-2023-25193",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-25193"
},
{
"name": "CVE-2025-40001",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40001"
},
{
"name": "CVE-2026-1485",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-1485"
},
{
"name": "CVE-2024-29025",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-29025"
},
{
"name": "CVE-2023-0466",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0466"
},
{
"name": "CVE-2022-27782",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-27782"
},
{
"name": "CVE-2022-32149",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32149"
},
{
"name": "CVE-2025-40035",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40035"
},
{
"name": "CVE-2023-0465",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0465"
},
{
"name": "CVE-2025-39988",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39988"
},
{
"name": "CVE-2026-22719",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-22719"
},
{
"name": "CVE-2022-32148",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32148"
},
{
"name": "CVE-2026-2005",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-2005"
},
{
"name": "CVE-2020-8177",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-8177"
},
{
"name": "CVE-2023-22081",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22081"
},
{
"name": "CVE-2022-39399",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-39399"
},
{
"name": "CVE-2022-4203",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-4203"
},
{
"name": "CVE-2025-38584",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38584"
},
{
"name": "CVE-2021-42374",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-42374"
},
{
"name": "CVE-2025-50106",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50106"
},
{
"name": "CVE-2025-40233",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40233"
},
{
"name": "CVE-2025-40020",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40020"
},
{
"name": "CVE-2023-3635",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-3635"
},
{
"name": "CVE-2025-40188",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40188"
},
{
"name": "CVE-2020-1971",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-1971"
},
{
"name": "CVE-2023-22041",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22041"
},
{
"name": "CVE-2022-21626",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21626"
},
{
"name": "CVE-2025-66200",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-66200"
},
{
"name": "CVE-2025-58057",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-58057"
},
{
"name": "CVE-2021-41771",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-41771"
},
{
"name": "CVE-2025-8291",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8291"
},
{
"name": "CVE-2023-45290",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45290"
},
{
"name": "CVE-2023-28320",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-28320"
},
{
"name": "CVE-2026-22795",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-22795"
},
{
"name": "CVE-2023-34231",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-34231"
},
{
"name": "CVE-2026-0988",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-0988"
},
{
"name": "CVE-2025-61727",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61727"
},
{
"name": "CVE-2025-22866",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22866"
},
{
"name": "CVE-2026-21925",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-21925"
},
{
"name": "CVE-2024-26308",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26308"
},
{
"name": "CVE-2024-34158",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-34158"
},
{
"name": "CVE-2025-30754",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30754"
},
{
"name": "CVE-2025-65637",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-65637"
},
{
"name": "CVE-2022-30630",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-30630"
},
{
"name": "CVE-2026-0861",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-0861"
},
{
"name": "CVE-2023-47090",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-47090"
},
{
"name": "CVE-2025-40049",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40049"
},
{
"name": "CVE-2025-47910",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-47910"
},
{
"name": "CVE-2021-4160",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-4160"
},
{
"name": "CVE-2025-40070",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40070"
},
{
"name": "CVE-2022-29946",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-29946"
},
{
"name": "CVE-2025-40106",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40106"
},
{
"name": "CVE-2023-0217",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0217"
},
{
"name": "CVE-2022-43552",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-43552"
},
{
"name": "CVE-2024-51744",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-51744"
},
{
"name": "CVE-2022-3786",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3786"
},
{
"name": "CVE-2021-3995",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3995"
},
{
"name": "CVE-2021-22947",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-22947"
},
{
"name": "CVE-2025-40205",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40205"
},
{
"name": "CVE-2023-48795",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-48795"
},
{
"name": "CVE-2025-6965",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6965"
},
{
"name": "CVE-2023-28319",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-28319"
},
{
"name": "CVE-2025-10966",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-10966"
},
{
"name": "CVE-2021-22922",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-22922"
},
{
"name": "CVE-2025-47906",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-47906"
},
{
"name": "CVE-2022-22576",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-22576"
},
{
"name": "CVE-2021-38561",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-38561"
},
{
"name": "CVE-2025-59375",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-59375"
},
{
"name": "CVE-2021-39293",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-39293"
},
{
"name": "CVE-2025-31133",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-31133"
},
{
"name": "CVE-2025-8194",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8194"
},
{
"name": "CVE-2024-29018",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-29018"
},
{
"name": "CVE-2022-1705",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1705"
},
{
"name": "CVE-2024-11053",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-11053"
},
{
"name": "CVE-2024-7264",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-7264"
},
{
"name": "CVE-2025-40027",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40027"
},
{
"name": "CVE-2025-39885",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39885"
},
{
"name": "CVE-2022-3510",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3510"
},
{
"name": "CVE-2022-3509",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3509"
},
{
"name": "CVE-2021-22946",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-22946"
},
{
"name": "CVE-2025-69421",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-69421"
},
{
"name": "CVE-2020-8284",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-8284"
},
{
"name": "CVE-2023-23915",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-23915"
},
{
"name": "CVE-2025-4517",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4517"
},
{
"name": "CVE-2025-58188",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-58188"
},
{
"name": "CVE-2025-30215",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30215"
},
{
"name": "CVE-2016-9843",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-9843"
},
{
"name": "CVE-2023-39318",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-39318"
},
{
"name": "CVE-2024-40635",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40635"
},
{
"name": "CVE-2022-41720",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41720"
},
{
"name": "CVE-2026-21948",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-21948"
},
{
"name": "CVE-2025-4674",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4674"
},
{
"name": "CVE-2022-41716",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41716"
},
{
"name": "CVE-2025-39970",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39970"
},
{
"name": "CVE-2021-3711",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3711"
},
{
"name": "CVE-2025-39994",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39994"
},
{
"name": "CVE-2025-52999",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-52999"
},
{
"name": "CVE-2024-56433",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56433"
},
{
"name": "CVE-2023-0464",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0464"
},
{
"name": "CVE-2022-29526",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-29526"
},
{
"name": "CVE-2025-40088",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40088"
},
{
"name": "CVE-2025-40220",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40220"
},
{
"name": "CVE-2021-3449",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3449"
},
{
"name": "CVE-2022-30633",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-30633"
},
{
"name": "CVE-2023-22036",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22036"
},
{
"name": "CVE-2025-13151",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-13151"
},
{
"name": "CVE-2025-22058",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22058"
},
{
"name": "CVE-2024-21634",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21634"
},
{
"name": "CVE-2022-28391",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-28391"
},
{
"name": "CVE-2022-38749",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-38749"
},
{
"name": "CVE-2025-40109",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40109"
},
{
"name": "CVE-2025-40006",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40006"
},
{
"name": "CVE-2022-21628",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21628"
},
{
"name": "CVE-2024-21011",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21011"
},
{
"name": "CVE-2025-6020",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6020"
},
{
"name": "CVE-2025-68161",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68161"
},
{
"name": "CVE-2024-45336",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45336"
},
{
"name": "CVE-2025-52881",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-52881"
},
{
"name": "CVE-2023-28842",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-28842"
},
{
"name": "CVE-2025-7425",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-7425"
},
{
"name": "CVE-2023-3978",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-3978"
},
{
"name": "CVE-2022-26652",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-26652"
},
{
"name": "CVE-2025-40011",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40011"
},
{
"name": "CVE-2024-5535",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-5535"
},
{
"name": "CVE-2025-40085",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40085"
},
{
"name": "CVE-2023-42365",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-42365"
},
{
"name": "CVE-2025-40231",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40231"
},
{
"name": "CVE-2025-22868",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22868"
},
{
"name": "CVE-2022-27775",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-27775"
},
{
"name": "CVE-2026-22796",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-22796"
},
{
"name": "CVE-2021-42379",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-42379"
},
{
"name": "CVE-2025-61724",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61724"
},
{
"name": "CVE-2024-5642",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-5642"
},
{
"name": "CVE-2023-23914",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-23914"
},
{
"name": "CVE-2025-23143",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23143"
},
{
"name": "CVE-2022-30632",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-30632"
},
{
"name": "CVE-2025-65082",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-65082"
},
{
"name": "CVE-2024-47554",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47554"
},
{
"name": "CVE-2022-27774",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-27774"
},
{
"name": "CVE-2023-25173",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-25173"
},
{
"name": "CVE-2025-61732",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61732"
},
{
"name": "CVE-2025-61723",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61723"
},
{
"name": "CVE-2025-9232",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-9232"
},
{
"name": "CVE-2023-29406",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-29406"
},
{
"name": "CVE-2023-39319",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-39319"
},
{
"name": "CVE-2026-21964",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-21964"
},
{
"name": "CVE-2025-21587",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21587"
},
{
"name": "CVE-2024-24785",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-24785"
},
{
"name": "CVE-2025-46394",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-46394"
},
{
"name": "CVE-2022-36109",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-36109"
},
{
"name": "CVE-2025-68146",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68146"
},
{
"name": "CVE-2025-40183",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40183"
},
{
"name": "CVE-2021-42381",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-42381"
},
{
"name": "CVE-2026-21441",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-21441"
},
{
"name": "CVE-2022-1962",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1962"
},
{
"name": "CVE-2024-45337",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45337"
},
{
"name": "CVE-2024-21147",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21147"
},
{
"name": "CVE-2022-41717",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41717"
},
{
"name": "CVE-2025-39998",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39998"
},
{
"name": "CVE-2025-13836",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-13836"
},
{
"name": "CVE-2023-39410",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-39410"
},
{
"name": "CVE-2025-43857",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-43857"
},
{
"name": "CVE-2023-28321",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-28321"
},
{
"name": "CVE-2024-25710",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-25710"
},
{
"name": "CVE-2025-40134",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40134"
},
{
"name": "CVE-2017-15874",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-15874"
},
{
"name": "CVE-2024-7254",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-7254"
},
{
"name": "CVE-2025-61725",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61725"
},
{
"name": "CVE-2026-25210",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-25210"
},
{
"name": "CVE-2025-39968",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39968"
},
{
"name": "CVE-2023-24536",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-24536"
},
{
"name": "CVE-2022-42915",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-42915"
},
{
"name": "CVE-2022-32221",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32221"
},
{
"name": "CVE-2022-29458",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-29458"
},
{
"name": "CVE-2025-55163",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55163"
},
{
"name": "CVE-2025-39986",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39986"
},
{
"name": "CVE-2025-39955",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39955"
},
{
"name": "CVE-2025-66293",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-66293"
},
{
"name": "CVE-2022-24769",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-24769"
},
{
"name": "CVE-2022-28131",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-28131"
},
{
"name": "CVE-2025-12818",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-12818"
},
{
"name": "CVE-2025-58098",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-58098"
},
{
"name": "CVE-2025-32990",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-32990"
},
{
"name": "CVE-2021-22897",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-22897"
},
{
"name": "CVE-2025-40078",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40078"
},
{
"name": "CVE-2025-15366",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-15366"
},
{
"name": "CVE-2022-24675",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-24675"
},
{
"name": "CVE-2024-21140",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21140"
},
{
"name": "CVE-2025-40116",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40116"
},
{
"name": "CVE-2025-68249",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68249"
},
{
"name": "CVE-2026-0990",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-0990"
},
{
"name": "CVE-2025-39934",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39934"
},
{
"name": "CVE-2026-0865",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-0865"
},
{
"name": "CVE-2024-21094",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21094"
},
{
"name": "CVE-2024-9143",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-9143"
},
{
"name": "CVE-2022-23806",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-23806"
},
{
"name": "CVE-2025-40179",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40179"
},
{
"name": "CVE-2025-40127",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40127"
},
{
"name": "CVE-2025-32989",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-32989"
},
{
"name": "CVE-2025-39996",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39996"
},
{
"name": "CVE-2025-22874",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22874"
},
{
"name": "CVE-2026-22721",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-22721"
},
{
"name": "CVE-2025-40053",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40053"
},
{
"name": "CVE-2026-24515",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-24515"
},
{
"name": "CVE-2025-39951",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39951"
},
{
"name": "CVE-2022-1271",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1271"
},
{
"name": "CVE-2025-40120",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40120"
},
{
"name": "CVE-2024-28085",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-28085"
},
{
"name": "CVE-2024-41110",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41110"
},
{
"name": "CVE-2025-50059",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50059"
},
{
"name": "CVE-2022-48174",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48174"
},
{
"name": "CVE-2025-61594",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61594"
},
{
"name": "CVE-2023-21835",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21835"
},
{
"name": "CVE-2024-34156",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-34156"
},
{
"name": "CVE-2022-2880",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2880"
},
{
"name": "CVE-2025-5025",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5025"
},
{
"name": "CVE-2023-21937",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21937"
},
{
"name": "CVE-2025-40243",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40243"
},
{
"name": "CVE-2022-23773",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-23773"
},
{
"name": "CVE-2021-41089",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-41089"
},
{
"name": "CVE-2023-24539",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-24539"
},
{
"name": "CVE-2025-14104",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-14104"
},
{
"name": "CVE-2023-6237",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6237"
},
{
"name": "CVE-2026-21968",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-21968"
},
{
"name": "CVE-2021-46848",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-46848"
},
{
"name": "CVE-2025-30761",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30761"
},
{
"name": "CVE-2025-47912",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-47912"
},
{
"name": "CVE-2023-25153",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-25153"
},
{
"name": "CVE-2024-47535",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47535"
},
{
"name": "CVE-2022-4450",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-4450"
},
{
"name": "CVE-2023-2650",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2650"
},
{
"name": "CVE-2025-68160",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68160"
},
{
"name": "CVE-2023-42364",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-42364"
},
{
"name": "CVE-2025-54410",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-54410"
},
{
"name": "CVE-2022-3996",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3996"
},
{
"name": "CVE-2022-2879",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2879"
},
{
"name": "CVE-2025-40118",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40118"
},
{
"name": "CVE-2022-32205",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32205"
},
{
"name": "CVE-2023-27534",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-27534"
},
{
"name": "CVE-2024-2398",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-2398"
},
{
"name": "CVE-2023-24532",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-24532"
},
{
"name": "CVE-2025-52565",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-52565"
},
{
"name": "CVE-2025-40021",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40021"
},
{
"name": "CVE-2025-67735",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-67735"
},
{
"name": "CVE-2022-23772",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-23772"
},
{
"name": "CVE-2025-61728",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61728"
},
{
"name": "CVE-2022-43551",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-43551"
},
{
"name": "CVE-2022-42004",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-42004"
},
{
"name": "CVE-2019-5747",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-5747"
},
{
"name": "CVE-2025-58186",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-58186"
},
{
"name": "CVE-2025-30698",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30698"
},
{
"name": "CVE-2025-40044",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40044"
},
{
"name": "CVE-2023-27533",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-27533"
},
{
"name": "CVE-2025-40105",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40105"
},
{
"name": "CVE-2018-1000500",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1000500"
},
{
"name": "CVE-2025-9086",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-9086"
},
{
"name": "CVE-2026-26014",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-26014"
},
{
"name": "CVE-2021-41772",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-41772"
},
{
"name": "CVE-2025-40112",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40112"
},
{
"name": "CVE-2024-27289",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27289"
},
{
"name": "CVE-2024-0727",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-0727"
},
{
"name": "CVE-2025-58187",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-58187"
},
{
"name": "CVE-2023-6129",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6129"
},
{
"name": "CVE-2025-39971",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39971"
},
{
"name": "CVE-2025-40154",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40154"
},
{
"name": "CVE-2025-13601",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-13601"
},
{
"name": "CVE-2025-12817",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-12817"
},
{
"name": "CVE-2025-4673",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4673"
},
{
"name": "CVE-2026-23949",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23949"
},
{
"name": "CVE-2021-42385",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-42385"
},
{
"name": "CVE-2023-22045",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22045"
},
{
"name": "CVE-2023-29400",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-29400"
},
{
"name": "CVE-2025-58056",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-58056"
},
{
"name": "CVE-2025-22871",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22871"
},
{
"name": "CVE-2024-21138",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21138"
},
{
"name": "CVE-2025-32988",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-32988"
},
{
"name": "CVE-2023-22049",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22049"
},
{
"name": "CVE-2024-24787",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-24787"
},
{
"name": "CVE-2026-0915",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-0915"
},
{
"name": "CVE-2025-15281",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-15281"
},
{
"name": "CVE-2022-0778",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0778"
},
{
"name": "CVE-2022-41854",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41854"
},
{
"name": "CVE-2022-41724",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41724"
},
{
"name": "CVE-2020-8908",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-8908"
},
{
"name": "CVE-2024-6119",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-6119"
},
{
"name": "CVE-2022-30634",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-30634"
},
{
"name": "CVE-2025-40126",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40126"
},
{
"name": "CVE-2025-39972",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39972"
},
{
"name": "CVE-2025-24294",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-24294"
},
{
"name": "CVE-2025-58181",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-58181"
},
{
"name": "CVE-2021-42836",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-42836"
},
{
"name": "CVE-2021-44716",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-44716"
},
{
"name": "CVE-2025-47914",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-47914"
},
{
"name": "CVE-2023-1255",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-1255"
},
{
"name": "CVE-2025-69418",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-69418"
},
{
"name": "CVE-2025-58058",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-58058"
},
{
"name": "CVE-2025-22869",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22869"
},
{
"name": "CVE-2025-40200",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40200"
},
{
"name": "CVE-2022-3358",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3358"
},
{
"name": "CVE-2025-38236",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38236"
},
{
"name": "CVE-2025-15468",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-15468"
},
{
"name": "CVE-2025-40124",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40124"
},
{
"name": "CVE-2025-39880",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39880"
},
{
"name": "CVE-2025-58189",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-58189"
},
{
"name": "CVE-2025-6021",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6021"
},
{
"name": "CVE-2025-40094",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40094"
},
{
"name": "CVE-2022-2097",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2097"
},
{
"name": "CVE-2023-24540",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-24540"
},
{
"name": "CVE-2024-4603",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-4603"
},
{
"name": "CVE-2022-25857",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-25857"
},
{
"name": "CVE-2022-38751",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-38751"
},
{
"name": "CVE-2025-25193",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-25193"
},
{
"name": "CVE-2024-8096",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-8096"
},
{
"name": "CVE-2026-21945",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-21945"
},
{
"name": "CVE-2024-21145",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21145"
},
{
"name": "CVE-2022-32206",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32206"
},
{
"name": "CVE-2026-21941",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-21941"
},
{
"name": "CVE-2025-22870",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22870"
},
{
"name": "CVE-2025-40215",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40215"
},
{
"name": "CVE-2025-40111",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40111"
},
{
"name": "CVE-2021-3712",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3712"
},
{
"name": "CVE-2023-21968",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21968"
},
{
"name": "CVE-2025-40068",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40068"
},
{
"name": "CVE-2025-40042",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40042"
},
{
"name": "CVE-2025-32415",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-32415"
},
{
"name": "CVE-2023-24537",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-24537"
},
{
"name": "CVE-2025-5889",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5889"
},
{
"name": "CVE-2025-30749",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30749"
},
{
"name": "CVE-2026-22695",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-22695"
},
{
"name": "CVE-2026-23490",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23490"
},
{
"name": "CVE-2026-24733",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-24733"
},
{
"name": "CVE-2026-0992",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-0992"
},
{
"name": "CVE-2025-9230",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-9230"
},
{
"name": "CVE-2026-21947",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-21947"
},
{
"name": "CVE-2025-66564",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-66564"
},
{
"name": "CVE-2023-45287",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45287"
},
{
"name": "CVE-2024-4741",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-4741"
},
{
"name": "CVE-2019-5482",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-5482"
},
{
"name": "CVE-2025-48924",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-48924"
},
{
"name": "CVE-2023-21930",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21930"
},
{
"name": "CVE-2022-38752",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-38752"
},
{
"name": "CVE-2021-22926",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-22926"
},
{
"name": "CVE-2025-8916",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8916"
},
{
"name": "CVE-2025-32414",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-32414"
},
{
"name": "CVE-2025-39937",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39937"
},
{
"name": "CVE-2025-11187",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-11187"
},
{
"name": "CVE-2024-20918",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-20918"
},
{
"name": "CVE-2025-40060",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40060"
},
{
"name": "CVE-2026-2003",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-2003"
},
{
"name": "CVE-2019-5443",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-5443"
},
{
"name": "CVE-2022-38750",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-38750"
},
{
"name": "CVE-2022-30580",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-30580"
},
{
"name": "CVE-2022-23471",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-23471"
},
{
"name": "CVE-2020-1967",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-1967"
},
{
"name": "CVE-2025-68121",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68121"
},
{
"name": "CVE-2025-60876",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-60876"
},
{
"name": "CVE-2023-24531",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-24531"
},
{
"name": "CVE-2021-23840",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-23840"
},
{
"name": "CVE-2023-24538",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-24538"
},
{
"name": "CVE-2023-2975",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2975"
},
{
"name": "CVE-2022-42003",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-42003"
},
{
"name": "CVE-2021-44717",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-44717"
},
{
"name": "CVE-2025-11065",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-11065"
},
{
"name": "CVE-2022-3602",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3602"
},
{
"name": "CVE-2026-1484",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-1484"
},
{
"name": "CVE-2025-4947",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4947"
},
{
"name": "CVE-2025-40178",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40178"
},
{
"name": "CVE-2022-29804",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-29804"
},
{
"name": "CVE-2025-39869",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39869"
},
{
"name": "CVE-2025-0725",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0725"
},
{
"name": "CVE-2023-2976",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2976"
},
{
"name": "CVE-2025-39985",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39985"
},
{
"name": "CVE-2025-61726",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61726"
},
{
"name": "CVE-2022-1434",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1434"
},
{
"name": "CVE-2021-22923",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-22923"
},
{
"name": "CVE-2022-41723",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41723"
},
{
"name": "CVE-2025-59464",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-59464"
},
{
"name": "CVE-2023-22006",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22006"
},
{
"name": "CVE-2019-5435",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-5435"
},
{
"name": "CVE-2022-1471",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1471"
},
{
"name": "CVE-2025-8058",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8058"
},
{
"name": "CVE-2026-1489",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-1489"
},
{
"name": "CVE-2023-39323",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-39323"
},
{
"name": "CVE-2023-29402",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-29402"
},
{
"name": "CVE-2026-2004",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-2004"
},
{
"name": "CVE-2026-0672",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-0672"
},
{
"name": "CVE-2025-8732",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8732"
},
{
"name": "CVE-2023-39326",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-39326"
},
{
"name": "CVE-2024-21085",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21085"
},
{
"name": "CVE-2021-43565",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-43565"
},
{
"name": "CVE-2025-21502",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21502"
},
{
"name": "CVE-2023-29409",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-29409"
},
{
"name": "CVE-2022-23648",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-23648"
},
{
"name": "CVE-2021-23841",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-23841"
},
{
"name": "CVE-2025-30204",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30204"
},
{
"name": "CVE-2023-39325",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-39325"
},
{
"name": "CVE-2025-5914",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5914"
},
{
"name": "CVE-2026-22720",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-22720"
},
{
"name": "CVE-2024-20945",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-20945"
},
{
"name": "CVE-2023-42363",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-42363"
},
{
"name": "CVE-2023-24534",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-24534"
},
{
"name": "CVE-2024-21131",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21131"
},
{
"name": "CVE-2025-39980",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39980"
},
{
"name": "CVE-2024-21210",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21210"
},
{
"name": "CVE-2023-3446",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-3446"
},
{
"name": "CVE-2024-2511",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-2511"
},
{
"name": "CVE-2025-53057",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53057"
},
{
"name": "CVE-2024-24786",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-24786"
},
{
"name": "CVE-2022-3171",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3171"
},
{
"name": "CVE-2019-1551",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-1551"
},
{
"name": "CVE-2025-40346",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40346"
},
{
"name": "CVE-2023-21967",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21967"
},
{
"name": "CVE-2024-34155",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-34155"
},
{
"name": "CVE-2022-21619",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21619"
},
{
"name": "CVE-2025-40030",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40030"
},
{
"name": "CVE-2025-40244",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40244"
},
{
"name": "CVE-2025-39995",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39995"
},
{
"name": "CVE-2025-68119",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68119"
},
{
"name": "CVE-2022-21698",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21698"
},
{
"name": "CVE-2025-53066",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53066"
},
{
"name": "CVE-2025-22873",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22873"
},
{
"name": "CVE-2023-5678",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-5678"
},
{
"name": "CVE-2024-24784",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-24784"
},
{
"name": "CVE-2022-27780",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-27780"
},
{
"name": "CVE-2025-39907",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39907"
},
{
"name": "CVE-2023-42366",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-42366"
},
{
"name": "CVE-2024-21217",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21217"
},
{
"name": "CVE-2025-0167",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0167"
},
{
"name": "CVE-2026-25547",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-25547"
},
{
"name": "CVE-2025-69420",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-69420"
},
{
"name": "CVE-2024-20952",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-20952"
},
{
"name": "CVE-2025-40140",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40140"
},
{
"name": "CVE-2024-24789",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-24789"
},
{
"name": "CVE-2025-40223",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40223"
},
{
"name": "CVE-2022-27664",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-27664"
},
{
"name": "CVE-2026-1225",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-1225"
},
{
"name": "CVE-2024-53114",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53114"
},
{
"name": "CVE-2024-27304",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27304"
},
{
"name": "CVE-2026-22703",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-22703"
},
{
"name": "CVE-2026-0989",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-0989"
},
{
"name": "CVE-2025-61729",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61729"
},
{
"name": "CVE-2025-39873",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39873"
},
{
"name": "CVE-2024-21208",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21208"
},
{
"name": "CVE-2023-23916",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-23916"
},
{
"name": "CVE-2022-29189",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-29189"
},
{
"name": "CVE-2025-38248",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38248"
},
{
"name": "CVE-2025-40351",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40351"
},
{
"name": "CVE-2025-40087",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40087"
},
{
"name": "CVE-2026-25646",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-25646"
}
],
"initial_release_date": "2026-02-24T00:00:00",
"last_revision_date": "2026-02-24T00:00:00",
"links": [],
"reference": "CERTFR-2026-AVI-0199",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2026-02-24T00:00:00.000000"
}
],
"risks": [
{
"description": "Injection de code indirecte \u00e0 distance (XSS)"
},
{
"description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
},
{
"description": "Non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur"
},
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
},
{
"description": "\u00c9l\u00e9vation de privil\u00e8ges"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les produits VMware. Certaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer une ex\u00e9cution de code arbitraire \u00e0 distance, une \u00e9l\u00e9vation de privil\u00e8ges et une injection de code indirecte \u00e0 distance (XSS).",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits VMware",
"vendor_advisories": [
{
"published_at": "2026-02-24",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 37012",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/37012"
},
{
"published_at": "2026-02-24",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 37001",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/37001"
},
{
"published_at": "2026-02-24",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 37013",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/37013"
},
{
"published_at": "2026-02-24",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 37003",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/37003"
},
{
"published_at": "2026-02-24",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 37023",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/37023"
},
{
"published_at": "2026-02-24",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 37017",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/37017"
},
{
"published_at": "2026-02-24",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 37006",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/37006"
},
{
"published_at": "2026-02-24",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 37024",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/37024"
},
{
"published_at": "2026-02-24",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36997",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36997"
},
{
"published_at": "2026-02-24",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 37004",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/37004"
},
{
"published_at": "2026-02-24",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36947",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36947"
},
{
"published_at": "2026-02-24",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 37018",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/37018"
},
{
"published_at": "2026-02-24",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 37005",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/37005"
},
{
"published_at": "2026-02-24",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 37008",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/37008"
},
{
"published_at": "2026-02-24",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 37007",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/37007"
},
{
"published_at": "2026-02-24",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 37020",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/37020"
},
{
"published_at": "2026-02-24",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36998",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36998"
},
{
"published_at": "2026-02-24",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 37002",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/37002"
},
{
"published_at": "2026-02-24",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 37021",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/37021"
},
{
"published_at": "2026-02-24",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 37022",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/37022"
},
{
"published_at": "2026-02-24",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 37016",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/37016"
},
{
"published_at": "2026-02-24",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 37019",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/37019"
},
{
"published_at": "2026-02-24",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 37010",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/37010"
},
{
"published_at": "2026-02-24",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 37009",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/37009"
},
{
"published_at": "2026-02-24",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 37000",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/37000"
},
{
"published_at": "2026-02-24",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 37011",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/37011"
},
{
"published_at": "2026-02-24",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 37015",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/37015"
},
{
"published_at": "2026-02-24",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 37014",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/37014"
},
{
"published_at": "2026-02-24",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36999",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36999"
}
]
}
CERTFR-2023-AVI-0453
Vulnerability from certfr_avis - Published: - Updated:
De multiples vulnérabilités ont été découvertes dans les produits Siemens. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance, un déni de service à distance et un contournement de la politique de sécurité.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Vendor | Product | Description | ||
|---|---|---|---|---|
| Siemens | N/A | SINAMICS GL150 versions antérieures à 7.2 | ||
| Siemens | N/A | Teamcenter Visualization versions 13.3.x antérieures à 13.3.0.10 | ||
| Siemens | N/A | SIMOTION D425-2 DP (6AU1425-2AA00-0AA0) versions antérieures à 5.5 SP1 | ||
| Siemens | N/A | CP-8050 MASTER MODULE (6MF2805-0AA00) versions antérieures à CPCI85 V05 | ||
| Siemens | N/A | POWER METER SICAM Q200 family versions antérieures à 2.70 | ||
| Siemens | N/A | SIMATIC NET PC Software V15 toutes versions | ||
| Siemens | N/A | SIMOTION D445-2 DP/PN (6AU1445-2AD00-0AA1) toutes versions | ||
| Siemens | N/A | SIMOTION D410-2 DP (6AU1410-2AA00-0AA0) versions antérieures à 5.5 SP1 | ||
| Siemens | N/A | SIMATIC STEP 7 V5 versions antérieures à 5.7 | ||
| Siemens | N/A | SIMOTION C240 (6AU1240-1AA00-0AA0) versions antérieures à 5.5 SP1 | ||
| Siemens | N/A | SIMATIC S7-1500 TM MFP - Linux Kernel | ||
| Siemens | N/A | SINAUT Software ST7sc toutes versions | ||
| Siemens | N/A | SIMOTION P320-4 E (6AU1320-4DE65-3AF0) toutes versions | ||
| Siemens | N/A | Teamcenter Visualization versions 14.0.x antérieures à 14.0.0.6 | ||
| Siemens | N/A | SIMOTION C240 PN (6AU1240-1AB00-0AA0) versions antérieures à 5.5 SP1 | ||
| Siemens | N/A | SIMATIC NET PC Software V14 toutes versions | ||
| Siemens | N/A | SIMATIC PCS 7 V9.0 toutes versions | ||
| Siemens | N/A | SIMATIC PCS 7 V9.1 toutes versions | ||
| Siemens | N/A | SIMATIC S7-1500 TM MFP - BIOS | ||
| Siemens | N/A | SIMOTION D435-2 DP/PN (6AU1435-2AD00-0AA0) versions antérieures à 5.5 SP1 | ||
| Siemens | N/A | SINAMICS SL150 versions antérieures à 7.2 | ||
| Siemens | N/A | SINAMICS PERFECT HARMONY GH180 6SR5 versions antérieures à 7.2 | ||
| Siemens | N/A | Teamcenter Visualization versions 13.2.x antérieures à 13.2.0.13 | ||
| Siemens | N/A | SIMOTION D435-2 DP (6AU1435-2AA00-0AA0) versions antérieures à 5.5 SP1 | ||
| Siemens | N/A | SIMOTION P320-4 S (6AU1320-4DS66-3AG0) toutes versions | ||
| Siemens | N/A | SIMATIC WinCC versions antérieures à 8.0 | ||
| Siemens | N/A | Teamcenter Visualization versions 14.2.x antérieures à 14.2.0.3 | ||
| Siemens | N/A | les contrôlleurs Desigo PX, se référer au bulletin ssa-824231 de l'éditeur pour la liste complète des versions affectées | ||
| Siemens | N/A | SIMOTION D445-2 DP/PN (6AU1445-2AD00-0AA0) versions antérieures à 5.5 SP1 | ||
| Siemens | N/A | SIMATIC S7-PM toutes versions | ||
| Siemens | N/A | Solid Edge SE2023 versions antérieures à 223.0 Update 5 | ||
| Siemens | N/A | JT2Go versions antérieures à 14.1.0.4 | ||
| Siemens | N/A | SIMOTION D455-2 DP/PN (6AU1455-2AD00-0AA0) versions antérieures à 5.5 SP1 | ||
| Siemens | N/A | SIMOTION D410-2 DP/PN (6AU1410-2AD00-0AA0) versions antérieures à 5.5 SP1 | ||
| Siemens | N/A | Teamcenter Visualization versions 14.1.x antérieures à 14.1.0.8 | ||
| Siemens | N/A | CP-8031 MASTER MODULE (6MF2803-1AA00) versions antérieures à CPCI85 V05 | ||
| Siemens | N/A | Totally Integrated Automation Portal (TIA Portal) versions 14 à 18 | ||
| Siemens | N/A | SIMATIC PCS 7 toutes versions | ||
| Siemens | N/A | SIMOTION D425-2 DP/PN (6AU1425-2AD00-0AA0) versions antérieures à 5.5 SP1 |
| Title | Publication Time | Tags | |||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||||||||||||||||||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "SINAMICS GL150 versions ant\u00e9rieures \u00e0 7.2",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "Teamcenter Visualization versions 13.3.x ant\u00e9rieures \u00e0 13.3.0.10",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMOTION D425-2 DP (6AU1425-2AA00-0AA0) versions ant\u00e9rieures \u00e0 5.5 SP1",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "CP-8050 MASTER MODULE (6MF2805-0AA00) versions ant\u00e9rieures \u00e0 CPCI85 V05",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "POWER METER SICAM Q200 family versions ant\u00e9rieures \u00e0 2.70",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMATIC NET PC Software V15 toutes versions",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMOTION D445-2 DP/PN (6AU1445-2AD00-0AA1) toutes versions",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMOTION D410-2 DP (6AU1410-2AA00-0AA0) versions ant\u00e9rieures \u00e0 5.5 SP1",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMATIC STEP 7 V5 versions ant\u00e9rieures \u00e0 5.7",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMOTION C240 (6AU1240-1AA00-0AA0) versions ant\u00e9rieures \u00e0 5.5 SP1",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMATIC S7-1500 TM MFP - Linux Kernel",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SINAUT Software ST7sc toutes versions",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMOTION P320-4 E (6AU1320-4DE65-3AF0) toutes versions",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "Teamcenter Visualization versions 14.0.x ant\u00e9rieures \u00e0 14.0.0.6",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMOTION C240 PN (6AU1240-1AB00-0AA0) versions ant\u00e9rieures \u00e0 5.5 SP1",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMATIC NET PC Software V14 toutes versions",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMATIC PCS 7 V9.0 toutes versions",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMATIC PCS 7 V9.1 toutes versions",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMATIC S7-1500 TM MFP - BIOS",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMOTION D435-2 DP/PN (6AU1435-2AD00-0AA0) versions ant\u00e9rieures \u00e0 5.5 SP1",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SINAMICS SL150 versions ant\u00e9rieures \u00e0 7.2",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SINAMICS PERFECT HARMONY GH180 6SR5 versions ant\u00e9rieures \u00e0 7.2",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "Teamcenter Visualization versions 13.2.x ant\u00e9rieures \u00e0 13.2.0.13",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMOTION D435-2 DP (6AU1435-2AA00-0AA0) versions ant\u00e9rieures \u00e0 5.5 SP1",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMOTION P320-4 S (6AU1320-4DS66-3AG0) toutes versions",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMATIC WinCC versions ant\u00e9rieures \u00e0 8.0",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "Teamcenter Visualization versions 14.2.x ant\u00e9rieures \u00e0 14.2.0.3",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "les contr\u00f4lleurs Desigo PX, se r\u00e9f\u00e9rer au bulletin ssa-824231 de l\u0027\u00e9diteur pour la liste compl\u00e8te des versions affect\u00e9es",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMOTION D445-2 DP/PN (6AU1445-2AD00-0AA0) versions ant\u00e9rieures \u00e0 5.5 SP1",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMATIC S7-PM toutes versions",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "Solid Edge SE2023 versions ant\u00e9rieures \u00e0 223.0 Update 5",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "JT2Go versions ant\u00e9rieures \u00e0 14.1.0.4",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMOTION D455-2 DP/PN (6AU1455-2AD00-0AA0) versions ant\u00e9rieures \u00e0 5.5 SP1",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMOTION D410-2 DP/PN (6AU1410-2AD00-0AA0) versions ant\u00e9rieures \u00e0 5.5 SP1",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "Teamcenter Visualization versions 14.1.x ant\u00e9rieures \u00e0 14.1.0.8",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "CP-8031 MASTER MODULE (6MF2803-1AA00) versions ant\u00e9rieures \u00e0 CPCI85 V05",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "Totally Integrated Automation Portal (TIA Portal) versions 14 \u00e0 18",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMATIC PCS 7 toutes versions",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMOTION D425-2 DP/PN (6AU1425-2AD00-0AA0) versions ant\u00e9rieures \u00e0 5.5 SP1",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2019-25013",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-25013"
},
{
"name": "CVE-2022-1343",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1343"
},
{
"name": "CVE-2021-42384",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-42384"
},
{
"name": "CVE-2022-35252",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-35252"
},
{
"name": "CVE-2022-1473",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1473"
},
{
"name": "CVE-2021-42378",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-42378"
},
{
"name": "CVE-2022-39190",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-39190"
},
{
"name": "CVE-2022-42720",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-42720"
},
{
"name": "CVE-2021-42382",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-42382"
},
{
"name": "CVE-2022-47520",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-47520"
},
{
"name": "CVE-2021-38604",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-38604"
},
{
"name": "CVE-2022-21233",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21233"
},
{
"name": "CVE-2021-42376",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-42376"
},
{
"name": "CVE-2022-3633",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3633"
},
{
"name": "CVE-2021-28831",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-28831"
},
{
"name": "CVE-2023-23454",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-23454"
},
{
"name": "CVE-2022-4304",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-4304"
},
{
"name": "CVE-2020-29562",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-29562"
},
{
"name": "CVE-2022-20421",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-20421"
},
{
"name": "CVE-2022-32208",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32208"
},
{
"name": "CVE-2018-4834",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-4834"
},
{
"name": "CVE-2022-32296",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32296"
},
{
"name": "CVE-2022-47929",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-47929"
},
{
"name": "CVE-2022-3628",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3628"
},
{
"name": "CVE-2021-42373",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-42373"
},
{
"name": "CVE-2022-1292",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1292"
},
{
"name": "CVE-2021-42377",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-42377"
},
{
"name": "CVE-2022-42329",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-42329"
},
{
"name": "CVE-2021-3998",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3998"
},
{
"name": "CVE-2023-23455",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-23455"
},
{
"name": "CVE-2020-1752",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-1752"
},
{
"name": "CVE-2022-42703",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-42703"
},
{
"name": "CVE-2022-47518",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-47518"
},
{
"name": "CVE-2023-31238",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-31238"
},
{
"name": "CVE-2022-32207",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32207"
},
{
"name": "CVE-2023-0215",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0215"
},
{
"name": "CVE-2023-0286",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0286"
},
{
"name": "CVE-2021-42386",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-42386"
},
{
"name": "CVE-2022-42895",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-42895"
},
{
"name": "CVE-2023-33919",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-33919"
},
{
"name": "CVE-2022-43750",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-43750"
},
{
"name": "CVE-2022-21166",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21166"
},
{
"name": "CVE-2022-3435",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3435"
},
{
"name": "CVE-2022-3169",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3169"
},
{
"name": "CVE-2022-2068",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2068"
},
{
"name": "CVE-2021-42380",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-42380"
},
{
"name": "CVE-2023-33920",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-33920"
},
{
"name": "CVE-2023-0466",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0466"
},
{
"name": "CVE-2023-0465",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0465"
},
{
"name": "CVE-2022-4662",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-4662"
},
{
"name": "CVE-2021-42374",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-42374"
},
{
"name": "CVE-2023-33124",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-33124"
},
{
"name": "CVE-2022-43545",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-43545"
},
{
"name": "CVE-2022-3564",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3564"
},
{
"name": "CVE-2022-3534",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3534"
},
{
"name": "CVE-2022-36280",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-36280"
},
{
"name": "CVE-2022-4129",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-4129"
},
{
"name": "CVE-2022-41218",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41218"
},
{
"name": "CVE-2023-26495",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-26495"
},
{
"name": "CVE-2022-34918",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-34918"
},
{
"name": "CVE-2022-20572",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-20572"
},
{
"name": "CVE-2022-41849",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41849"
},
{
"name": "CVE-2022-42432",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-42432"
},
{
"name": "CVE-2022-42896",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-42896"
},
{
"name": "CVE-2023-0179",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0179"
},
{
"name": "CVE-2022-47946",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-47946"
},
{
"name": "CVE-2021-33655",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33655"
},
{
"name": "CVE-2022-2602",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2602"
},
{
"name": "CVE-2022-1462",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1462"
},
{
"name": "CVE-2023-25910",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-25910"
},
{
"name": "CVE-2023-33921",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-33921"
},
{
"name": "CVE-2022-4095",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-4095"
},
{
"name": "CVE-2022-2585",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2585"
},
{
"name": "CVE-2023-0464",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0464"
},
{
"name": "CVE-2022-21125",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21125"
},
{
"name": "CVE-2022-2078",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2078"
},
{
"name": "CVE-2022-1184",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1184"
},
{
"name": "CVE-2022-41222",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41222"
},
{
"name": "CVE-2022-2663",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2663"
},
{
"name": "CVE-2022-2586",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2586"
},
{
"name": "CVE-2022-28391",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-28391"
},
{
"name": "CVE-2023-26607",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-26607"
},
{
"name": "CVE-2022-3649",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3649"
},
{
"name": "CVE-2022-3545",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3545"
},
{
"name": "CVE-2020-10029",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-10029"
},
{
"name": "CVE-2022-42719",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-42719"
},
{
"name": "CVE-2018-25032",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-25032"
},
{
"name": "CVE-2021-42379",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-42379"
},
{
"name": "CVE-2021-20269",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-20269"
},
{
"name": "CVE-2021-3999",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3999"
},
{
"name": "CVE-2021-3759",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3759"
},
{
"name": "CVE-2023-23559",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-23559"
},
{
"name": "CVE-2022-3524",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3524"
},
{
"name": "CVE-2022-32250",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32250"
},
{
"name": "CVE-2022-2274",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2274"
},
{
"name": "CVE-2018-13405",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-13405"
},
{
"name": "CVE-2022-39188",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-39188"
},
{
"name": "CVE-2021-42381",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-42381"
},
{
"name": "CVE-2022-21505",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21505"
},
{
"name": "CVE-2022-36123",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-36123"
},
{
"name": "CVE-2022-3586",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3586"
},
{
"name": "CVE-2021-4037",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-4037"
},
{
"name": "CVE-2022-41850",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41850"
},
{
"name": "CVE-2022-2978",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2978"
},
{
"name": "CVE-2022-3646",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3646"
},
{
"name": "CVE-2022-3625",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3625"
},
{
"name": "CVE-2022-42328",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-42328"
},
{
"name": "CVE-2022-3565",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3565"
},
{
"name": "CVE-2023-33122",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-33122"
},
{
"name": "CVE-2022-42721",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-42721"
},
{
"name": "CVE-2022-4378",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-4378"
},
{
"name": "CVE-2022-0547",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0547"
},
{
"name": "CVE-2022-21123",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21123"
},
{
"name": "CVE-2022-43398",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-43398"
},
{
"name": "CVE-2022-1012",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1012"
},
{
"name": "CVE-2022-3115",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3115"
},
{
"name": "CVE-2021-42383",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-42383"
},
{
"name": "CVE-2023-1095",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-1095"
},
{
"name": "CVE-2022-4450",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-4450"
},
{
"name": "CVE-2022-0171",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0171"
},
{
"name": "CVE-2022-26373",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-26373"
},
{
"name": "CVE-2022-2905",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2905"
},
{
"name": "CVE-2022-20422",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-20422"
},
{
"name": "CVE-2023-0394",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0394"
},
{
"name": "CVE-2022-32205",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32205"
},
{
"name": "CVE-2022-3594",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3594"
},
{
"name": "CVE-2022-36946",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-36946"
},
{
"name": "CVE-2022-3303",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3303"
},
{
"name": "CVE-2016-10228",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-10228"
},
{
"name": "CVE-2021-42385",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-42385"
},
{
"name": "CVE-2022-23308",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-23308"
},
{
"name": "CVE-2022-1679",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1679"
},
{
"name": "CVE-2022-36879",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-36879"
},
{
"name": "CVE-2022-23218",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-23218"
},
{
"name": "CVE-2023-27465",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-27465"
},
{
"name": "CVE-2022-3629",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3629"
},
{
"name": "CVE-2023-33121",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-33121"
},
{
"name": "CVE-2022-2959",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2959"
},
{
"name": "CVE-2023-28829",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-28829"
},
{
"name": "CVE-2022-2588",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2588"
},
{
"name": "CVE-2022-2097",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2097"
},
{
"name": "CVE-2022-32206",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32206"
},
{
"name": "CVE-2023-1077",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-1077"
},
{
"name": "CVE-2021-35942",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35942"
},
{
"name": "CVE-2023-1073",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-1073"
},
{
"name": "CVE-2023-30757",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-30757"
},
{
"name": "CVE-2021-33574",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33574"
},
{
"name": "CVE-2022-42722",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-42722"
},
{
"name": "CVE-2021-3326",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3326"
},
{
"name": "CVE-2022-20566",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-20566"
},
{
"name": "CVE-2022-2327",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2327"
},
{
"name": "CVE-2022-1199",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1199"
},
{
"name": "CVE-2022-3621",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3621"
},
{
"name": "CVE-2022-1434",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1434"
},
{
"name": "CVE-2022-3606",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3606"
},
{
"name": "CVE-2022-1852",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1852"
},
{
"name": "CVE-2021-27645",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-27645"
},
{
"name": "CVE-2022-40768",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-40768"
},
{
"name": "CVE-2022-4139",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-4139"
},
{
"name": "CVE-2022-3521",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3521"
},
{
"name": "CVE-2022-3104",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3104"
},
{
"name": "CVE-2021-42375",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-42375"
},
{
"name": "CVE-2022-2503",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2503"
},
{
"name": "CVE-2022-3028",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3028"
},
{
"name": "CVE-2023-0590",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0590"
},
{
"name": "CVE-2023-30897",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-30897"
},
{
"name": "CVE-2022-40307",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-40307"
},
{
"name": "CVE-2020-27618",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-27618"
},
{
"name": "CVE-2022-23219",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-23219"
},
{
"name": "CVE-2022-30065",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-30065"
},
{
"name": "CVE-2022-41674",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41674"
},
{
"name": "CVE-2022-1882",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1882"
},
{
"name": "CVE-2022-3635",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3635"
},
{
"name": "CVE-2022-43439",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-43439"
},
{
"name": "CVE-2023-33123",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-33123"
},
{
"name": "CVE-2023-30901",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-30901"
},
{
"name": "CVE-2022-43546",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-43546"
},
{
"name": "CVE-2022-2153",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2153"
}
],
"links": [],
"reference": "CERTFR-2023-AVI-0453",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2023-06-13T00:00:00.000000"
},
{
"description": "Modification de la date du bulletin de s\u00e9curit\u00e9 ssa-824231.",
"revision_date": "2023-06-14T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
},
{
"description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
},
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
},
{
"description": "\u00c9l\u00e9vation de privil\u00e8ges"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les produits\nSiemens. Certaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer\nune ex\u00e9cution de code arbitraire \u00e0 distance, un d\u00e9ni de service \u00e0\ndistance et un contournement de la politique de s\u00e9curit\u00e9.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits Siemens",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Siemens ssa-975766 du 13 juin 2023",
"url": "https://cert-portal.siemens.com/productcert/html/ssa-975766.html"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Siemens ssa-042050 du 13 juin 2023",
"url": "https://cert-portal.siemens.com/productcert/html/ssa-042050.html"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Siemens ssa-731916 du 13 juin 2023",
"url": "https://cert-portal.siemens.com/productcert/html/ssa-731916.html"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Siemens ssa-914026 du 13 juin 2023",
"url": "https://cert-portal.siemens.com/productcert/html/ssa-914026.html"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Siemens ssa-794697 du 13 juin 2023",
"url": "https://cert-portal.siemens.com/productcert/html/ssa-794697.html"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Siemens ssa-538795 du 13 juin 2023",
"url": "https://cert-portal.siemens.com/productcert/html/ssa-538795.html"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Siemens ssa-831302 du 13 juin 2023",
"url": "https://cert-portal.siemens.com/productcert/html/ssa-831302.html"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Siemens ssa-482956 du 13 juin 2023",
"url": "https://cert-portal.siemens.com/productcert/html/ssa-482956.html"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Siemens ssa-508677 du 13 juin 2023",
"url": "https://cert-portal.siemens.com/productcert/html/ssa-508677.html"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Siemens ssa-968170 du 13 juin 2023",
"url": "https://cert-portal.siemens.com/productcert/html/ssa-968170.html"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Siemens ssa-824231 du 24 janvier 2018",
"url": "https://cert-portal.siemens.com/productcert/html/ssa-824231.html"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Siemens ssa-942865 du 13 juin 2023",
"url": "https://cert-portal.siemens.com/productcert/html/ssa-942865.html"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Siemens ssa-887249 du 13 juin 2023",
"url": "https://cert-portal.siemens.com/productcert/html/ssa-887249.html"
}
]
}
SUSE-SU-2022:0135-1
Vulnerability from csaf_suse - Published: 2022-01-20 09:05 - Updated: 2022-01-20 09:05Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for busybox",
"title": "Title of the patch"
},
{
"category": "description",
"text": "This update for busybox fixes the following issues:\n\n- CVE-2011-5325: Fixed tar directory traversal (bsc#951562).\n- CVE-2015-9261: Fixed segfalts and application crashes in huft_build (bsc#1102912).\n- CVE-2016-2147: Fixed out of bounds write (heap) due to integer underflow in udhcpc (bsc#970663).\n- CVE-2016-2148: Fixed heap-based buffer overflow in OPTION_6RD parsing (bsc#970662).\n- CVE-2016-6301: Fixed NTP server denial of service flaw (bsc#991940).\n- CVE-2017-15873: Fixed integer overflow in get_next_block function in archival/libarchive/decompress_bunzip2.c (bsc#1064976).\n- CVE-2017-15874: Fixed integer underflow in archival/libarchive/decompress_unlzma.c (bsc#1064978).\n- CVE-2017-16544: Fixed Insufficient sanitization of filenames when autocompleting (bsc#1069412).\n- CVE-2018-1000500 : Fixed missing SSL certificate validation in wget (bsc#1099263).\n- CVE-2018-1000517: Fixed heap-based buffer overflow in the retrieve_file_data() (bsc#1099260).\n- CVE-2018-20679: Fixed out of bounds read in udhcp (bsc#1121426).\n- CVE-2019-5747: Fixed out of bounds read in udhcp components (bsc#1121428).\n- CVE-2021-28831: Fixed invalid free or segmentation fault via malformed gzip data (bsc#1184522).\n- CVE-2021-42373: Fixed NULL pointer dereference in man leading to DoS when a section name is supplied but no page argument is given (bsc#1192869).\n- CVE-2021-42374: Fixed out-of-bounds heap read in unlzma leading to information leak and DoS when crafted LZMA-compressed input is decompressed (bsc#1192869).\n- CVE-2021-42375: Fixed incorrect handling of a special element in ash leading to DoS when processing a crafted shell command, due to the shell mistaking specific characters for reserved characters (bsc#1192869).\n- CVE-2021-42376: Fixed NULL pointer dereference in hush leading to DoS when processing a crafted shell command (bsc#1192869).\n- CVE-2021-42377: Fixed attacker-controlled pointer free in hush leading to DoS and possible code execution when processing a crafted shell command (bsc#1192869).\n- CVE-2021-42378: Fixed use-after-free in awk leading to DoS and possibly code execution when processing a crafted awk pattern in the getvar_i function (bsc#1192869).\n- CVE-2021-42379: Fixed use-after-free in awk leading to DoS and possibly code execution when processing a crafted awk pattern in the next_input_file function (bsc#1192869).\n- CVE-2021-42380: Fixed use-after-free in awk leading to DoS and possibly code execution when processing a crafted awk pattern in the clrvar function (bsc#1192869).\n- CVE-2021-42381: Fixed use-after-free in awk leading to DoS and possibly code execution when processing a crafted awk pattern in the hash_init function (bsc#1192869).\n- CVE-2021-42382: Fixed use-after-free in awk leading to DoS and possibly code execution when processing a crafted awk pattern in the getvar_s function (bsc#1192869).\n- CVE-2021-42383: Fixed use-after-free in awk leading to DoS and possibly code execution when processing a crafted awk pattern in the evaluate function (bsc#1192869).\n- CVE-2021-42384: Fixed use-after-free in awk leading to DoS and possibly code execution when processing a crafted awk pattern in the handle_special function (bsc#1192869).\n- CVE-2021-42385: Fixed use-after-free in awk leading to DoS and possibly code execution when processing a crafted awk pattern in the evaluate function (bsc#1192869).\n- CVE-2021-42386: Fixed use-after-free in awk leading to DoS and possibly code execution when processing a crafted awk pattern in the nvalloc function (bsc#1192869).\n",
"title": "Description of the patch"
},
{
"category": "details",
"text": "SUSE-2022-135,SUSE-SLE-Module-Basesystem-15-SP3-2022-135,SUSE-SLE-Product-HPC-15-2022-135,SUSE-SLE-Product-HPC-15-SP1-ESPOS-2022-135,SUSE-SLE-Product-HPC-15-SP1-LTSS-2022-135,SUSE-SLE-Product-HPC-15-SP2-ESPOS-2022-135,SUSE-SLE-Product-HPC-15-SP2-LTSS-2022-135,SUSE-SLE-Product-SLES-15-2022-135,SUSE-SLE-Product-SLES-15-SP1-BCL-2022-135,SUSE-SLE-Product-SLES-15-SP1-LTSS-2022-135,SUSE-SLE-Product-SLES-15-SP2-BCL-2022-135,SUSE-SLE-Product-SLES-15-SP2-LTSS-2022-135,SUSE-SLE-Product-SLES_SAP-15-2022-135,SUSE-SLE-Product-SLES_SAP-15-SP1-2022-135,SUSE-SLE-Product-SLES_SAP-15-SP2-2022-135,SUSE-SLE-Product-SUSE-Manager-Proxy-4.1-2022-135,SUSE-SLE-Product-SUSE-Manager-Retail-Branch-Server-4.1-2022-135,SUSE-SLE-Product-SUSE-Manager-Server-4.1-2022-135,SUSE-Storage-6-2022-135,SUSE-Storage-7-2022-135",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2022_0135-1.json"
},
{
"category": "self",
"summary": "URL for SUSE-SU-2022:0135-1",
"url": "https://www.suse.com/support/update/announcement/2022/suse-su-20220135-1/"
},
{
"category": "self",
"summary": "E-Mail link for SUSE-SU-2022:0135-1",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2022-January/010031.html"
},
{
"category": "self",
"summary": "SUSE Bug 1064976",
"url": "https://bugzilla.suse.com/1064976"
},
{
"category": "self",
"summary": "SUSE Bug 1064978",
"url": "https://bugzilla.suse.com/1064978"
},
{
"category": "self",
"summary": "SUSE Bug 1069412",
"url": "https://bugzilla.suse.com/1069412"
},
{
"category": "self",
"summary": "SUSE Bug 1099260",
"url": "https://bugzilla.suse.com/1099260"
},
{
"category": "self",
"summary": "SUSE Bug 1099263",
"url": "https://bugzilla.suse.com/1099263"
},
{
"category": "self",
"summary": "SUSE Bug 1102912",
"url": "https://bugzilla.suse.com/1102912"
},
{
"category": "self",
"summary": "SUSE Bug 1121426",
"url": "https://bugzilla.suse.com/1121426"
},
{
"category": "self",
"summary": "SUSE Bug 1121428",
"url": "https://bugzilla.suse.com/1121428"
},
{
"category": "self",
"summary": "SUSE Bug 1184522",
"url": "https://bugzilla.suse.com/1184522"
},
{
"category": "self",
"summary": "SUSE Bug 1192869",
"url": "https://bugzilla.suse.com/1192869"
},
{
"category": "self",
"summary": "SUSE Bug 951562",
"url": "https://bugzilla.suse.com/951562"
},
{
"category": "self",
"summary": "SUSE Bug 970662",
"url": "https://bugzilla.suse.com/970662"
},
{
"category": "self",
"summary": "SUSE Bug 970663",
"url": "https://bugzilla.suse.com/970663"
},
{
"category": "self",
"summary": "SUSE Bug 991940",
"url": "https://bugzilla.suse.com/991940"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2011-5325 page",
"url": "https://www.suse.com/security/cve/CVE-2011-5325/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2015-9261 page",
"url": "https://www.suse.com/security/cve/CVE-2015-9261/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2016-2147 page",
"url": "https://www.suse.com/security/cve/CVE-2016-2147/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2016-2148 page",
"url": "https://www.suse.com/security/cve/CVE-2016-2148/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2016-6301 page",
"url": "https://www.suse.com/security/cve/CVE-2016-6301/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-15873 page",
"url": "https://www.suse.com/security/cve/CVE-2017-15873/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-15874 page",
"url": "https://www.suse.com/security/cve/CVE-2017-15874/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-16544 page",
"url": "https://www.suse.com/security/cve/CVE-2017-16544/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2018-1000500 page",
"url": "https://www.suse.com/security/cve/CVE-2018-1000500/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2018-1000517 page",
"url": "https://www.suse.com/security/cve/CVE-2018-1000517/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2018-20679 page",
"url": "https://www.suse.com/security/cve/CVE-2018-20679/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-5747 page",
"url": "https://www.suse.com/security/cve/CVE-2019-5747/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-28831 page",
"url": "https://www.suse.com/security/cve/CVE-2021-28831/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-42373 page",
"url": "https://www.suse.com/security/cve/CVE-2021-42373/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-42374 page",
"url": "https://www.suse.com/security/cve/CVE-2021-42374/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-42375 page",
"url": "https://www.suse.com/security/cve/CVE-2021-42375/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-42376 page",
"url": "https://www.suse.com/security/cve/CVE-2021-42376/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-42377 page",
"url": "https://www.suse.com/security/cve/CVE-2021-42377/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-42378 page",
"url": "https://www.suse.com/security/cve/CVE-2021-42378/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-42379 page",
"url": "https://www.suse.com/security/cve/CVE-2021-42379/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-42380 page",
"url": "https://www.suse.com/security/cve/CVE-2021-42380/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-42381 page",
"url": "https://www.suse.com/security/cve/CVE-2021-42381/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-42382 page",
"url": "https://www.suse.com/security/cve/CVE-2021-42382/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-42383 page",
"url": "https://www.suse.com/security/cve/CVE-2021-42383/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-42384 page",
"url": "https://www.suse.com/security/cve/CVE-2021-42384/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-42385 page",
"url": "https://www.suse.com/security/cve/CVE-2021-42385/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-42386 page",
"url": "https://www.suse.com/security/cve/CVE-2021-42386/"
}
],
"title": "Security update for busybox",
"tracking": {
"current_release_date": "2022-01-20T09:05:15Z",
"generator": {
"date": "2022-01-20T09:05:15Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "SUSE-SU-2022:0135-1",
"initial_release_date": "2022-01-20T09:05:15Z",
"revision_history": [
{
"date": "2022-01-20T09:05:15Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "busybox-1.34.1-4.9.1.aarch64",
"product": {
"name": "busybox-1.34.1-4.9.1.aarch64",
"product_id": "busybox-1.34.1-4.9.1.aarch64"
}
},
{
"category": "product_version",
"name": "busybox-static-1.34.1-4.9.1.aarch64",
"product": {
"name": "busybox-static-1.34.1-4.9.1.aarch64",
"product_id": "busybox-static-1.34.1-4.9.1.aarch64"
}
},
{
"category": "product_version",
"name": "busybox-testsuite-1.34.1-4.9.1.aarch64",
"product": {
"name": "busybox-testsuite-1.34.1-4.9.1.aarch64",
"product_id": "busybox-testsuite-1.34.1-4.9.1.aarch64"
}
},
{
"category": "product_version",
"name": "busybox-warewulf3-1.34.1-4.9.1.aarch64",
"product": {
"name": "busybox-warewulf3-1.34.1-4.9.1.aarch64",
"product_id": "busybox-warewulf3-1.34.1-4.9.1.aarch64"
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "busybox-1.34.1-4.9.1.i586",
"product": {
"name": "busybox-1.34.1-4.9.1.i586",
"product_id": "busybox-1.34.1-4.9.1.i586"
}
},
{
"category": "product_version",
"name": "busybox-static-1.34.1-4.9.1.i586",
"product": {
"name": "busybox-static-1.34.1-4.9.1.i586",
"product_id": "busybox-static-1.34.1-4.9.1.i586"
}
},
{
"category": "product_version",
"name": "busybox-testsuite-1.34.1-4.9.1.i586",
"product": {
"name": "busybox-testsuite-1.34.1-4.9.1.i586",
"product_id": "busybox-testsuite-1.34.1-4.9.1.i586"
}
},
{
"category": "product_version",
"name": "busybox-warewulf3-1.34.1-4.9.1.i586",
"product": {
"name": "busybox-warewulf3-1.34.1-4.9.1.i586",
"product_id": "busybox-warewulf3-1.34.1-4.9.1.i586"
}
}
],
"category": "architecture",
"name": "i586"
},
{
"branches": [
{
"category": "product_version",
"name": "busybox-1.34.1-4.9.1.ppc64le",
"product": {
"name": "busybox-1.34.1-4.9.1.ppc64le",
"product_id": "busybox-1.34.1-4.9.1.ppc64le"
}
},
{
"category": "product_version",
"name": "busybox-static-1.34.1-4.9.1.ppc64le",
"product": {
"name": "busybox-static-1.34.1-4.9.1.ppc64le",
"product_id": "busybox-static-1.34.1-4.9.1.ppc64le"
}
},
{
"category": "product_version",
"name": "busybox-testsuite-1.34.1-4.9.1.ppc64le",
"product": {
"name": "busybox-testsuite-1.34.1-4.9.1.ppc64le",
"product_id": "busybox-testsuite-1.34.1-4.9.1.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "busybox-1.34.1-4.9.1.s390x",
"product": {
"name": "busybox-1.34.1-4.9.1.s390x",
"product_id": "busybox-1.34.1-4.9.1.s390x"
}
},
{
"category": "product_version",
"name": "busybox-static-1.34.1-4.9.1.s390x",
"product": {
"name": "busybox-static-1.34.1-4.9.1.s390x",
"product_id": "busybox-static-1.34.1-4.9.1.s390x"
}
},
{
"category": "product_version",
"name": "busybox-testsuite-1.34.1-4.9.1.s390x",
"product": {
"name": "busybox-testsuite-1.34.1-4.9.1.s390x",
"product_id": "busybox-testsuite-1.34.1-4.9.1.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "busybox-1.34.1-4.9.1.x86_64",
"product": {
"name": "busybox-1.34.1-4.9.1.x86_64",
"product_id": "busybox-1.34.1-4.9.1.x86_64"
}
},
{
"category": "product_version",
"name": "busybox-static-1.34.1-4.9.1.x86_64",
"product": {
"name": "busybox-static-1.34.1-4.9.1.x86_64",
"product_id": "busybox-static-1.34.1-4.9.1.x86_64"
}
},
{
"category": "product_version",
"name": "busybox-testsuite-1.34.1-4.9.1.x86_64",
"product": {
"name": "busybox-testsuite-1.34.1-4.9.1.x86_64",
"product_id": "busybox-testsuite-1.34.1-4.9.1.x86_64"
}
},
{
"category": "product_version",
"name": "busybox-warewulf3-1.34.1-4.9.1.x86_64",
"product": {
"name": "busybox-warewulf3-1.34.1-4.9.1.x86_64",
"product_id": "busybox-warewulf3-1.34.1-4.9.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux Enterprise Module for Basesystem 15 SP3",
"product": {
"name": "SUSE Linux Enterprise Module for Basesystem 15 SP3",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP3",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-module-basesystem:15:sp3"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise High Performance Computing 15-ESPOS",
"product": {
"name": "SUSE Linux Enterprise High Performance Computing 15-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15-ESPOS",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle_hpc-espos:15"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise High Performance Computing 15-LTSS",
"product": {
"name": "SUSE Linux Enterprise High Performance Computing 15-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15-LTSS",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle_hpc-ltss:15"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS",
"product": {
"name": "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle_hpc-espos:15:sp1"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS",
"product": {
"name": "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle_hpc-ltss:15:sp1"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS",
"product": {
"name": "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle_hpc-espos:15:sp2"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS",
"product": {
"name": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle_hpc-ltss:15:sp2"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server 15-LTSS",
"product": {
"name": "SUSE Linux Enterprise Server 15-LTSS",
"product_id": "SUSE Linux Enterprise Server 15-LTSS",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles-ltss:15"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server 15 SP1-BCL",
"product": {
"name": "SUSE Linux Enterprise Server 15 SP1-BCL",
"product_id": "SUSE Linux Enterprise Server 15 SP1-BCL",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles_bcl:15:sp1"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server 15 SP1-LTSS",
"product": {
"name": "SUSE Linux Enterprise Server 15 SP1-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP1-LTSS",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles-ltss:15:sp1"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server 15 SP2-BCL",
"product": {
"name": "SUSE Linux Enterprise Server 15 SP2-BCL",
"product_id": "SUSE Linux Enterprise Server 15 SP2-BCL",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles_bcl:15:sp2"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server 15 SP2-LTSS",
"product": {
"name": "SUSE Linux Enterprise Server 15 SP2-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP2-LTSS",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles-ltss:15:sp2"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server for SAP Applications 15",
"product": {
"name": "SUSE Linux Enterprise Server for SAP Applications 15",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles_sap:15"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server for SAP Applications 15 SP1",
"product": {
"name": "SUSE Linux Enterprise Server for SAP Applications 15 SP1",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP1",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles_sap:15:sp1"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server for SAP Applications 15 SP2",
"product": {
"name": "SUSE Linux Enterprise Server for SAP Applications 15 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP2",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles_sap:15:sp2"
}
}
},
{
"category": "product_name",
"name": "SUSE Manager Proxy 4.1",
"product": {
"name": "SUSE Manager Proxy 4.1",
"product_id": "SUSE Manager Proxy 4.1",
"product_identification_helper": {
"cpe": "cpe:/o:suse:suse-manager-proxy:4.1"
}
}
},
{
"category": "product_name",
"name": "SUSE Manager Retail Branch Server 4.1",
"product": {
"name": "SUSE Manager Retail Branch Server 4.1",
"product_id": "SUSE Manager Retail Branch Server 4.1",
"product_identification_helper": {
"cpe": "cpe:/o:suse:suse-manager-retail-branch-server:4.1"
}
}
},
{
"category": "product_name",
"name": "SUSE Manager Server 4.1",
"product": {
"name": "SUSE Manager Server 4.1",
"product_id": "SUSE Manager Server 4.1",
"product_identification_helper": {
"cpe": "cpe:/o:suse:suse-manager-server:4.1"
}
}
},
{
"category": "product_name",
"name": "SUSE Enterprise Storage 6",
"product": {
"name": "SUSE Enterprise Storage 6",
"product_id": "SUSE Enterprise Storage 6",
"product_identification_helper": {
"cpe": "cpe:/o:suse:ses:6"
}
}
},
{
"category": "product_name",
"name": "SUSE Enterprise Storage 7",
"product": {
"name": "SUSE Enterprise Storage 7",
"product_id": "SUSE Enterprise Storage 7",
"product_identification_helper": {
"cpe": "cpe:/o:suse:ses:7"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "busybox-1.34.1-4.9.1.aarch64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP3",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.34.1-4.9.1.aarch64"
},
"product_reference": "busybox-1.34.1-4.9.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "busybox-1.34.1-4.9.1.ppc64le as component of SUSE Linux Enterprise Module for Basesystem 15 SP3",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.34.1-4.9.1.ppc64le"
},
"product_reference": "busybox-1.34.1-4.9.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "busybox-1.34.1-4.9.1.s390x as component of SUSE Linux Enterprise Module for Basesystem 15 SP3",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.34.1-4.9.1.s390x"
},
"product_reference": "busybox-1.34.1-4.9.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "busybox-1.34.1-4.9.1.x86_64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP3",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.34.1-4.9.1.x86_64"
},
"product_reference": "busybox-1.34.1-4.9.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "busybox-static-1.34.1-4.9.1.aarch64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP3",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.34.1-4.9.1.aarch64"
},
"product_reference": "busybox-static-1.34.1-4.9.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "busybox-static-1.34.1-4.9.1.ppc64le as component of SUSE Linux Enterprise Module for Basesystem 15 SP3",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.34.1-4.9.1.ppc64le"
},
"product_reference": "busybox-static-1.34.1-4.9.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "busybox-static-1.34.1-4.9.1.s390x as component of SUSE Linux Enterprise Module for Basesystem 15 SP3",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.34.1-4.9.1.s390x"
},
"product_reference": "busybox-static-1.34.1-4.9.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "busybox-static-1.34.1-4.9.1.x86_64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP3",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.34.1-4.9.1.x86_64"
},
"product_reference": "busybox-static-1.34.1-4.9.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "busybox-1.34.1-4.9.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15-ESPOS:busybox-1.34.1-4.9.1.aarch64"
},
"product_reference": "busybox-1.34.1-4.9.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "busybox-1.34.1-4.9.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15-ESPOS:busybox-1.34.1-4.9.1.x86_64"
},
"product_reference": "busybox-1.34.1-4.9.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "busybox-1.34.1-4.9.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15-LTSS:busybox-1.34.1-4.9.1.aarch64"
},
"product_reference": "busybox-1.34.1-4.9.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "busybox-1.34.1-4.9.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15-LTSS:busybox-1.34.1-4.9.1.x86_64"
},
"product_reference": "busybox-1.34.1-4.9.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "busybox-1.34.1-4.9.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-1.34.1-4.9.1.aarch64"
},
"product_reference": "busybox-1.34.1-4.9.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "busybox-1.34.1-4.9.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-1.34.1-4.9.1.x86_64"
},
"product_reference": "busybox-1.34.1-4.9.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "busybox-static-1.34.1-4.9.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-static-1.34.1-4.9.1.aarch64"
},
"product_reference": "busybox-static-1.34.1-4.9.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "busybox-static-1.34.1-4.9.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-static-1.34.1-4.9.1.x86_64"
},
"product_reference": "busybox-static-1.34.1-4.9.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "busybox-1.34.1-4.9.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-1.34.1-4.9.1.aarch64"
},
"product_reference": "busybox-1.34.1-4.9.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "busybox-1.34.1-4.9.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-1.34.1-4.9.1.x86_64"
},
"product_reference": "busybox-1.34.1-4.9.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "busybox-static-1.34.1-4.9.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.aarch64"
},
"product_reference": "busybox-static-1.34.1-4.9.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "busybox-static-1.34.1-4.9.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.x86_64"
},
"product_reference": "busybox-static-1.34.1-4.9.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "busybox-1.34.1-4.9.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:busybox-1.34.1-4.9.1.aarch64"
},
"product_reference": "busybox-1.34.1-4.9.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "busybox-1.34.1-4.9.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:busybox-1.34.1-4.9.1.x86_64"
},
"product_reference": "busybox-1.34.1-4.9.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "busybox-static-1.34.1-4.9.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:busybox-static-1.34.1-4.9.1.aarch64"
},
"product_reference": "busybox-static-1.34.1-4.9.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "busybox-static-1.34.1-4.9.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:busybox-static-1.34.1-4.9.1.x86_64"
},
"product_reference": "busybox-static-1.34.1-4.9.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "busybox-1.34.1-4.9.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:busybox-1.34.1-4.9.1.aarch64"
},
"product_reference": "busybox-1.34.1-4.9.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "busybox-1.34.1-4.9.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:busybox-1.34.1-4.9.1.x86_64"
},
"product_reference": "busybox-1.34.1-4.9.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "busybox-static-1.34.1-4.9.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.aarch64"
},
"product_reference": "busybox-static-1.34.1-4.9.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "busybox-static-1.34.1-4.9.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.x86_64"
},
"product_reference": "busybox-static-1.34.1-4.9.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "busybox-1.34.1-4.9.1.aarch64 as component of SUSE Linux Enterprise Server 15-LTSS",
"product_id": "SUSE Linux Enterprise Server 15-LTSS:busybox-1.34.1-4.9.1.aarch64"
},
"product_reference": "busybox-1.34.1-4.9.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "busybox-1.34.1-4.9.1.ppc64le as component of SUSE Linux Enterprise Server 15-LTSS",
"product_id": "SUSE Linux Enterprise Server 15-LTSS:busybox-1.34.1-4.9.1.ppc64le"
},
"product_reference": "busybox-1.34.1-4.9.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "busybox-1.34.1-4.9.1.s390x as component of SUSE Linux Enterprise Server 15-LTSS",
"product_id": "SUSE Linux Enterprise Server 15-LTSS:busybox-1.34.1-4.9.1.s390x"
},
"product_reference": "busybox-1.34.1-4.9.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "busybox-1.34.1-4.9.1.x86_64 as component of SUSE Linux Enterprise Server 15-LTSS",
"product_id": "SUSE Linux Enterprise Server 15-LTSS:busybox-1.34.1-4.9.1.x86_64"
},
"product_reference": "busybox-1.34.1-4.9.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "busybox-1.34.1-4.9.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP1-BCL",
"product_id": "SUSE Linux Enterprise Server 15 SP1-BCL:busybox-1.34.1-4.9.1.x86_64"
},
"product_reference": "busybox-1.34.1-4.9.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP1-BCL"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "busybox-static-1.34.1-4.9.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP1-BCL",
"product_id": "SUSE Linux Enterprise Server 15 SP1-BCL:busybox-static-1.34.1-4.9.1.x86_64"
},
"product_reference": "busybox-static-1.34.1-4.9.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP1-BCL"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "busybox-1.34.1-4.9.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP1-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.34.1-4.9.1.aarch64"
},
"product_reference": "busybox-1.34.1-4.9.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "busybox-1.34.1-4.9.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP1-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.34.1-4.9.1.ppc64le"
},
"product_reference": "busybox-1.34.1-4.9.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "busybox-1.34.1-4.9.1.s390x as component of SUSE Linux Enterprise Server 15 SP1-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.34.1-4.9.1.s390x"
},
"product_reference": "busybox-1.34.1-4.9.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "busybox-1.34.1-4.9.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP1-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.34.1-4.9.1.x86_64"
},
"product_reference": "busybox-1.34.1-4.9.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "busybox-static-1.34.1-4.9.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP1-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.aarch64"
},
"product_reference": "busybox-static-1.34.1-4.9.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "busybox-static-1.34.1-4.9.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP1-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.ppc64le"
},
"product_reference": "busybox-static-1.34.1-4.9.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "busybox-static-1.34.1-4.9.1.s390x as component of SUSE Linux Enterprise Server 15 SP1-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.s390x"
},
"product_reference": "busybox-static-1.34.1-4.9.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "busybox-static-1.34.1-4.9.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP1-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.x86_64"
},
"product_reference": "busybox-static-1.34.1-4.9.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "busybox-1.34.1-4.9.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP2-BCL",
"product_id": "SUSE Linux Enterprise Server 15 SP2-BCL:busybox-1.34.1-4.9.1.x86_64"
},
"product_reference": "busybox-1.34.1-4.9.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP2-BCL"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "busybox-static-1.34.1-4.9.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP2-BCL",
"product_id": "SUSE Linux Enterprise Server 15 SP2-BCL:busybox-static-1.34.1-4.9.1.x86_64"
},
"product_reference": "busybox-static-1.34.1-4.9.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP2-BCL"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "busybox-1.34.1-4.9.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP2-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-1.34.1-4.9.1.aarch64"
},
"product_reference": "busybox-1.34.1-4.9.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "busybox-1.34.1-4.9.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP2-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-1.34.1-4.9.1.ppc64le"
},
"product_reference": "busybox-1.34.1-4.9.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "busybox-1.34.1-4.9.1.s390x as component of SUSE Linux Enterprise Server 15 SP2-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-1.34.1-4.9.1.s390x"
},
"product_reference": "busybox-1.34.1-4.9.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "busybox-1.34.1-4.9.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP2-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-1.34.1-4.9.1.x86_64"
},
"product_reference": "busybox-1.34.1-4.9.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "busybox-static-1.34.1-4.9.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP2-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.aarch64"
},
"product_reference": "busybox-static-1.34.1-4.9.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "busybox-static-1.34.1-4.9.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP2-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.ppc64le"
},
"product_reference": "busybox-static-1.34.1-4.9.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "busybox-static-1.34.1-4.9.1.s390x as component of SUSE Linux Enterprise Server 15 SP2-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.s390x"
},
"product_reference": "busybox-static-1.34.1-4.9.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "busybox-static-1.34.1-4.9.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP2-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.x86_64"
},
"product_reference": "busybox-static-1.34.1-4.9.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "busybox-1.34.1-4.9.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15:busybox-1.34.1-4.9.1.ppc64le"
},
"product_reference": "busybox-1.34.1-4.9.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "busybox-1.34.1-4.9.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15:busybox-1.34.1-4.9.1.x86_64"
},
"product_reference": "busybox-1.34.1-4.9.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "busybox-1.34.1-4.9.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP1",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-1.34.1-4.9.1.ppc64le"
},
"product_reference": "busybox-1.34.1-4.9.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "busybox-1.34.1-4.9.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP1",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-1.34.1-4.9.1.x86_64"
},
"product_reference": "busybox-1.34.1-4.9.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "busybox-static-1.34.1-4.9.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP1",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-static-1.34.1-4.9.1.ppc64le"
},
"product_reference": "busybox-static-1.34.1-4.9.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "busybox-static-1.34.1-4.9.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP1",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-static-1.34.1-4.9.1.x86_64"
},
"product_reference": "busybox-static-1.34.1-4.9.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "busybox-1.34.1-4.9.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP2:busybox-1.34.1-4.9.1.ppc64le"
},
"product_reference": "busybox-1.34.1-4.9.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "busybox-1.34.1-4.9.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP2:busybox-1.34.1-4.9.1.x86_64"
},
"product_reference": "busybox-1.34.1-4.9.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "busybox-static-1.34.1-4.9.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP2:busybox-static-1.34.1-4.9.1.ppc64le"
},
"product_reference": "busybox-static-1.34.1-4.9.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "busybox-static-1.34.1-4.9.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP2:busybox-static-1.34.1-4.9.1.x86_64"
},
"product_reference": "busybox-static-1.34.1-4.9.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "busybox-1.34.1-4.9.1.x86_64 as component of SUSE Manager Proxy 4.1",
"product_id": "SUSE Manager Proxy 4.1:busybox-1.34.1-4.9.1.x86_64"
},
"product_reference": "busybox-1.34.1-4.9.1.x86_64",
"relates_to_product_reference": "SUSE Manager Proxy 4.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "busybox-static-1.34.1-4.9.1.x86_64 as component of SUSE Manager Proxy 4.1",
"product_id": "SUSE Manager Proxy 4.1:busybox-static-1.34.1-4.9.1.x86_64"
},
"product_reference": "busybox-static-1.34.1-4.9.1.x86_64",
"relates_to_product_reference": "SUSE Manager Proxy 4.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "busybox-1.34.1-4.9.1.x86_64 as component of SUSE Manager Retail Branch Server 4.1",
"product_id": "SUSE Manager Retail Branch Server 4.1:busybox-1.34.1-4.9.1.x86_64"
},
"product_reference": "busybox-1.34.1-4.9.1.x86_64",
"relates_to_product_reference": "SUSE Manager Retail Branch Server 4.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "busybox-static-1.34.1-4.9.1.x86_64 as component of SUSE Manager Retail Branch Server 4.1",
"product_id": "SUSE Manager Retail Branch Server 4.1:busybox-static-1.34.1-4.9.1.x86_64"
},
"product_reference": "busybox-static-1.34.1-4.9.1.x86_64",
"relates_to_product_reference": "SUSE Manager Retail Branch Server 4.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "busybox-1.34.1-4.9.1.ppc64le as component of SUSE Manager Server 4.1",
"product_id": "SUSE Manager Server 4.1:busybox-1.34.1-4.9.1.ppc64le"
},
"product_reference": "busybox-1.34.1-4.9.1.ppc64le",
"relates_to_product_reference": "SUSE Manager Server 4.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "busybox-1.34.1-4.9.1.s390x as component of SUSE Manager Server 4.1",
"product_id": "SUSE Manager Server 4.1:busybox-1.34.1-4.9.1.s390x"
},
"product_reference": "busybox-1.34.1-4.9.1.s390x",
"relates_to_product_reference": "SUSE Manager Server 4.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "busybox-1.34.1-4.9.1.x86_64 as component of SUSE Manager Server 4.1",
"product_id": "SUSE Manager Server 4.1:busybox-1.34.1-4.9.1.x86_64"
},
"product_reference": "busybox-1.34.1-4.9.1.x86_64",
"relates_to_product_reference": "SUSE Manager Server 4.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "busybox-static-1.34.1-4.9.1.ppc64le as component of SUSE Manager Server 4.1",
"product_id": "SUSE Manager Server 4.1:busybox-static-1.34.1-4.9.1.ppc64le"
},
"product_reference": "busybox-static-1.34.1-4.9.1.ppc64le",
"relates_to_product_reference": "SUSE Manager Server 4.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "busybox-static-1.34.1-4.9.1.s390x as component of SUSE Manager Server 4.1",
"product_id": "SUSE Manager Server 4.1:busybox-static-1.34.1-4.9.1.s390x"
},
"product_reference": "busybox-static-1.34.1-4.9.1.s390x",
"relates_to_product_reference": "SUSE Manager Server 4.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "busybox-static-1.34.1-4.9.1.x86_64 as component of SUSE Manager Server 4.1",
"product_id": "SUSE Manager Server 4.1:busybox-static-1.34.1-4.9.1.x86_64"
},
"product_reference": "busybox-static-1.34.1-4.9.1.x86_64",
"relates_to_product_reference": "SUSE Manager Server 4.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "busybox-1.34.1-4.9.1.aarch64 as component of SUSE Enterprise Storage 6",
"product_id": "SUSE Enterprise Storage 6:busybox-1.34.1-4.9.1.aarch64"
},
"product_reference": "busybox-1.34.1-4.9.1.aarch64",
"relates_to_product_reference": "SUSE Enterprise Storage 6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "busybox-1.34.1-4.9.1.x86_64 as component of SUSE Enterprise Storage 6",
"product_id": "SUSE Enterprise Storage 6:busybox-1.34.1-4.9.1.x86_64"
},
"product_reference": "busybox-1.34.1-4.9.1.x86_64",
"relates_to_product_reference": "SUSE Enterprise Storage 6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "busybox-static-1.34.1-4.9.1.aarch64 as component of SUSE Enterprise Storage 6",
"product_id": "SUSE Enterprise Storage 6:busybox-static-1.34.1-4.9.1.aarch64"
},
"product_reference": "busybox-static-1.34.1-4.9.1.aarch64",
"relates_to_product_reference": "SUSE Enterprise Storage 6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "busybox-static-1.34.1-4.9.1.x86_64 as component of SUSE Enterprise Storage 6",
"product_id": "SUSE Enterprise Storage 6:busybox-static-1.34.1-4.9.1.x86_64"
},
"product_reference": "busybox-static-1.34.1-4.9.1.x86_64",
"relates_to_product_reference": "SUSE Enterprise Storage 6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "busybox-1.34.1-4.9.1.aarch64 as component of SUSE Enterprise Storage 7",
"product_id": "SUSE Enterprise Storage 7:busybox-1.34.1-4.9.1.aarch64"
},
"product_reference": "busybox-1.34.1-4.9.1.aarch64",
"relates_to_product_reference": "SUSE Enterprise Storage 7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "busybox-1.34.1-4.9.1.x86_64 as component of SUSE Enterprise Storage 7",
"product_id": "SUSE Enterprise Storage 7:busybox-1.34.1-4.9.1.x86_64"
},
"product_reference": "busybox-1.34.1-4.9.1.x86_64",
"relates_to_product_reference": "SUSE Enterprise Storage 7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "busybox-static-1.34.1-4.9.1.aarch64 as component of SUSE Enterprise Storage 7",
"product_id": "SUSE Enterprise Storage 7:busybox-static-1.34.1-4.9.1.aarch64"
},
"product_reference": "busybox-static-1.34.1-4.9.1.aarch64",
"relates_to_product_reference": "SUSE Enterprise Storage 7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "busybox-static-1.34.1-4.9.1.x86_64 as component of SUSE Enterprise Storage 7",
"product_id": "SUSE Enterprise Storage 7:busybox-static-1.34.1-4.9.1.x86_64"
},
"product_reference": "busybox-static-1.34.1-4.9.1.x86_64",
"relates_to_product_reference": "SUSE Enterprise Storage 7"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2011-5325",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2011-5325"
}
],
"notes": [
{
"category": "general",
"text": "Directory traversal vulnerability in the BusyBox implementation of tar before 1.22.0 v5 allows remote attackers to point to files outside the current working directory via a symlink.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Enterprise Storage 6:busybox-1.34.1-4.9.1.aarch64",
"SUSE Enterprise Storage 6:busybox-1.34.1-4.9.1.x86_64",
"SUSE Enterprise Storage 6:busybox-static-1.34.1-4.9.1.aarch64",
"SUSE Enterprise Storage 6:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Enterprise Storage 7:busybox-1.34.1-4.9.1.aarch64",
"SUSE Enterprise Storage 7:busybox-1.34.1-4.9.1.x86_64",
"SUSE Enterprise Storage 7:busybox-static-1.34.1-4.9.1.aarch64",
"SUSE Enterprise Storage 7:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-static-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:busybox-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:busybox-static-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:busybox-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:busybox-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:busybox-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.34.1-4.9.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.34.1-4.9.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.34.1-4.9.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.34.1-4.9.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.34.1-4.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.34.1-4.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-1.34.1-4.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-1.34.1-4.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:busybox-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:busybox-1.34.1-4.9.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:busybox-1.34.1-4.9.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-1.34.1-4.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-static-1.34.1-4.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:busybox-1.34.1-4.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:busybox-static-1.34.1-4.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:busybox-1.34.1-4.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:busybox-1.34.1-4.9.1.x86_64",
"SUSE Manager Proxy 4.1:busybox-1.34.1-4.9.1.x86_64",
"SUSE Manager Proxy 4.1:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:busybox-1.34.1-4.9.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Manager Server 4.1:busybox-1.34.1-4.9.1.ppc64le",
"SUSE Manager Server 4.1:busybox-1.34.1-4.9.1.s390x",
"SUSE Manager Server 4.1:busybox-1.34.1-4.9.1.x86_64",
"SUSE Manager Server 4.1:busybox-static-1.34.1-4.9.1.ppc64le",
"SUSE Manager Server 4.1:busybox-static-1.34.1-4.9.1.s390x",
"SUSE Manager Server 4.1:busybox-static-1.34.1-4.9.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2011-5325",
"url": "https://www.suse.com/security/cve/CVE-2011-5325"
},
{
"category": "external",
"summary": "SUSE Bug 951562 for CVE-2011-5325",
"url": "https://bugzilla.suse.com/951562"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Enterprise Storage 6:busybox-1.34.1-4.9.1.aarch64",
"SUSE Enterprise Storage 6:busybox-1.34.1-4.9.1.x86_64",
"SUSE Enterprise Storage 6:busybox-static-1.34.1-4.9.1.aarch64",
"SUSE Enterprise Storage 6:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Enterprise Storage 7:busybox-1.34.1-4.9.1.aarch64",
"SUSE Enterprise Storage 7:busybox-1.34.1-4.9.1.x86_64",
"SUSE Enterprise Storage 7:busybox-static-1.34.1-4.9.1.aarch64",
"SUSE Enterprise Storage 7:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-static-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:busybox-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:busybox-static-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:busybox-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:busybox-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:busybox-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.34.1-4.9.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.34.1-4.9.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.34.1-4.9.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.34.1-4.9.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.34.1-4.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.34.1-4.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-1.34.1-4.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-1.34.1-4.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:busybox-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:busybox-1.34.1-4.9.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:busybox-1.34.1-4.9.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-1.34.1-4.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-static-1.34.1-4.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:busybox-1.34.1-4.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:busybox-static-1.34.1-4.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:busybox-1.34.1-4.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:busybox-1.34.1-4.9.1.x86_64",
"SUSE Manager Proxy 4.1:busybox-1.34.1-4.9.1.x86_64",
"SUSE Manager Proxy 4.1:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:busybox-1.34.1-4.9.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Manager Server 4.1:busybox-1.34.1-4.9.1.ppc64le",
"SUSE Manager Server 4.1:busybox-1.34.1-4.9.1.s390x",
"SUSE Manager Server 4.1:busybox-1.34.1-4.9.1.x86_64",
"SUSE Manager Server 4.1:busybox-static-1.34.1-4.9.1.ppc64le",
"SUSE Manager Server 4.1:busybox-static-1.34.1-4.9.1.s390x",
"SUSE Manager Server 4.1:busybox-static-1.34.1-4.9.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N",
"version": "3.1"
},
"products": [
"SUSE Enterprise Storage 6:busybox-1.34.1-4.9.1.aarch64",
"SUSE Enterprise Storage 6:busybox-1.34.1-4.9.1.x86_64",
"SUSE Enterprise Storage 6:busybox-static-1.34.1-4.9.1.aarch64",
"SUSE Enterprise Storage 6:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Enterprise Storage 7:busybox-1.34.1-4.9.1.aarch64",
"SUSE Enterprise Storage 7:busybox-1.34.1-4.9.1.x86_64",
"SUSE Enterprise Storage 7:busybox-static-1.34.1-4.9.1.aarch64",
"SUSE Enterprise Storage 7:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-static-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:busybox-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:busybox-static-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:busybox-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:busybox-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:busybox-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.34.1-4.9.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.34.1-4.9.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.34.1-4.9.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.34.1-4.9.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.34.1-4.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.34.1-4.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-1.34.1-4.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-1.34.1-4.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:busybox-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:busybox-1.34.1-4.9.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:busybox-1.34.1-4.9.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-1.34.1-4.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-static-1.34.1-4.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:busybox-1.34.1-4.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:busybox-static-1.34.1-4.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:busybox-1.34.1-4.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:busybox-1.34.1-4.9.1.x86_64",
"SUSE Manager Proxy 4.1:busybox-1.34.1-4.9.1.x86_64",
"SUSE Manager Proxy 4.1:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:busybox-1.34.1-4.9.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Manager Server 4.1:busybox-1.34.1-4.9.1.ppc64le",
"SUSE Manager Server 4.1:busybox-1.34.1-4.9.1.s390x",
"SUSE Manager Server 4.1:busybox-1.34.1-4.9.1.x86_64",
"SUSE Manager Server 4.1:busybox-static-1.34.1-4.9.1.ppc64le",
"SUSE Manager Server 4.1:busybox-static-1.34.1-4.9.1.s390x",
"SUSE Manager Server 4.1:busybox-static-1.34.1-4.9.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-01-20T09:05:15Z",
"details": "moderate"
}
],
"title": "CVE-2011-5325"
},
{
"cve": "CVE-2015-9261",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2015-9261"
}
],
"notes": [
{
"category": "general",
"text": "huft_build in archival/libarchive/decompress_gunzip.c in BusyBox before 1.27.2 misuses a pointer, causing segfaults and an application crash during an unzip operation on a specially crafted ZIP file.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Enterprise Storage 6:busybox-1.34.1-4.9.1.aarch64",
"SUSE Enterprise Storage 6:busybox-1.34.1-4.9.1.x86_64",
"SUSE Enterprise Storage 6:busybox-static-1.34.1-4.9.1.aarch64",
"SUSE Enterprise Storage 6:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Enterprise Storage 7:busybox-1.34.1-4.9.1.aarch64",
"SUSE Enterprise Storage 7:busybox-1.34.1-4.9.1.x86_64",
"SUSE Enterprise Storage 7:busybox-static-1.34.1-4.9.1.aarch64",
"SUSE Enterprise Storage 7:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-static-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:busybox-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:busybox-static-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:busybox-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:busybox-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:busybox-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.34.1-4.9.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.34.1-4.9.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.34.1-4.9.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.34.1-4.9.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.34.1-4.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.34.1-4.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-1.34.1-4.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-1.34.1-4.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:busybox-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:busybox-1.34.1-4.9.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:busybox-1.34.1-4.9.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-1.34.1-4.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-static-1.34.1-4.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:busybox-1.34.1-4.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:busybox-static-1.34.1-4.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:busybox-1.34.1-4.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:busybox-1.34.1-4.9.1.x86_64",
"SUSE Manager Proxy 4.1:busybox-1.34.1-4.9.1.x86_64",
"SUSE Manager Proxy 4.1:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:busybox-1.34.1-4.9.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Manager Server 4.1:busybox-1.34.1-4.9.1.ppc64le",
"SUSE Manager Server 4.1:busybox-1.34.1-4.9.1.s390x",
"SUSE Manager Server 4.1:busybox-1.34.1-4.9.1.x86_64",
"SUSE Manager Server 4.1:busybox-static-1.34.1-4.9.1.ppc64le",
"SUSE Manager Server 4.1:busybox-static-1.34.1-4.9.1.s390x",
"SUSE Manager Server 4.1:busybox-static-1.34.1-4.9.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2015-9261",
"url": "https://www.suse.com/security/cve/CVE-2015-9261"
},
{
"category": "external",
"summary": "SUSE Bug 1102912 for CVE-2015-9261",
"url": "https://bugzilla.suse.com/1102912"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Enterprise Storage 6:busybox-1.34.1-4.9.1.aarch64",
"SUSE Enterprise Storage 6:busybox-1.34.1-4.9.1.x86_64",
"SUSE Enterprise Storage 6:busybox-static-1.34.1-4.9.1.aarch64",
"SUSE Enterprise Storage 6:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Enterprise Storage 7:busybox-1.34.1-4.9.1.aarch64",
"SUSE Enterprise Storage 7:busybox-1.34.1-4.9.1.x86_64",
"SUSE Enterprise Storage 7:busybox-static-1.34.1-4.9.1.aarch64",
"SUSE Enterprise Storage 7:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-static-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:busybox-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:busybox-static-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:busybox-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:busybox-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:busybox-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.34.1-4.9.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.34.1-4.9.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.34.1-4.9.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.34.1-4.9.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.34.1-4.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.34.1-4.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-1.34.1-4.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-1.34.1-4.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:busybox-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:busybox-1.34.1-4.9.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:busybox-1.34.1-4.9.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-1.34.1-4.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-static-1.34.1-4.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:busybox-1.34.1-4.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:busybox-static-1.34.1-4.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:busybox-1.34.1-4.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:busybox-1.34.1-4.9.1.x86_64",
"SUSE Manager Proxy 4.1:busybox-1.34.1-4.9.1.x86_64",
"SUSE Manager Proxy 4.1:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:busybox-1.34.1-4.9.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Manager Server 4.1:busybox-1.34.1-4.9.1.ppc64le",
"SUSE Manager Server 4.1:busybox-1.34.1-4.9.1.s390x",
"SUSE Manager Server 4.1:busybox-1.34.1-4.9.1.x86_64",
"SUSE Manager Server 4.1:busybox-static-1.34.1-4.9.1.ppc64le",
"SUSE Manager Server 4.1:busybox-static-1.34.1-4.9.1.s390x",
"SUSE Manager Server 4.1:busybox-static-1.34.1-4.9.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"SUSE Enterprise Storage 6:busybox-1.34.1-4.9.1.aarch64",
"SUSE Enterprise Storage 6:busybox-1.34.1-4.9.1.x86_64",
"SUSE Enterprise Storage 6:busybox-static-1.34.1-4.9.1.aarch64",
"SUSE Enterprise Storage 6:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Enterprise Storage 7:busybox-1.34.1-4.9.1.aarch64",
"SUSE Enterprise Storage 7:busybox-1.34.1-4.9.1.x86_64",
"SUSE Enterprise Storage 7:busybox-static-1.34.1-4.9.1.aarch64",
"SUSE Enterprise Storage 7:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-static-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:busybox-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:busybox-static-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:busybox-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:busybox-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:busybox-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.34.1-4.9.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.34.1-4.9.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.34.1-4.9.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.34.1-4.9.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.34.1-4.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.34.1-4.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-1.34.1-4.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-1.34.1-4.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:busybox-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:busybox-1.34.1-4.9.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:busybox-1.34.1-4.9.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-1.34.1-4.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-static-1.34.1-4.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:busybox-1.34.1-4.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:busybox-static-1.34.1-4.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:busybox-1.34.1-4.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:busybox-1.34.1-4.9.1.x86_64",
"SUSE Manager Proxy 4.1:busybox-1.34.1-4.9.1.x86_64",
"SUSE Manager Proxy 4.1:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:busybox-1.34.1-4.9.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Manager Server 4.1:busybox-1.34.1-4.9.1.ppc64le",
"SUSE Manager Server 4.1:busybox-1.34.1-4.9.1.s390x",
"SUSE Manager Server 4.1:busybox-1.34.1-4.9.1.x86_64",
"SUSE Manager Server 4.1:busybox-static-1.34.1-4.9.1.ppc64le",
"SUSE Manager Server 4.1:busybox-static-1.34.1-4.9.1.s390x",
"SUSE Manager Server 4.1:busybox-static-1.34.1-4.9.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-01-20T09:05:15Z",
"details": "low"
}
],
"title": "CVE-2015-9261"
},
{
"cve": "CVE-2016-2147",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2016-2147"
}
],
"notes": [
{
"category": "general",
"text": "Integer overflow in the DHCP client (udhcpc) in BusyBox before 1.25.0 allows remote attackers to cause a denial of service (crash) via a malformed RFC1035-encoded domain name, which triggers an out-of-bounds heap write.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Enterprise Storage 6:busybox-1.34.1-4.9.1.aarch64",
"SUSE Enterprise Storage 6:busybox-1.34.1-4.9.1.x86_64",
"SUSE Enterprise Storage 6:busybox-static-1.34.1-4.9.1.aarch64",
"SUSE Enterprise Storage 6:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Enterprise Storage 7:busybox-1.34.1-4.9.1.aarch64",
"SUSE Enterprise Storage 7:busybox-1.34.1-4.9.1.x86_64",
"SUSE Enterprise Storage 7:busybox-static-1.34.1-4.9.1.aarch64",
"SUSE Enterprise Storage 7:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-static-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:busybox-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:busybox-static-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:busybox-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:busybox-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:busybox-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.34.1-4.9.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.34.1-4.9.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.34.1-4.9.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.34.1-4.9.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.34.1-4.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.34.1-4.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-1.34.1-4.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-1.34.1-4.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:busybox-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:busybox-1.34.1-4.9.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:busybox-1.34.1-4.9.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-1.34.1-4.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-static-1.34.1-4.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:busybox-1.34.1-4.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:busybox-static-1.34.1-4.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:busybox-1.34.1-4.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:busybox-1.34.1-4.9.1.x86_64",
"SUSE Manager Proxy 4.1:busybox-1.34.1-4.9.1.x86_64",
"SUSE Manager Proxy 4.1:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:busybox-1.34.1-4.9.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Manager Server 4.1:busybox-1.34.1-4.9.1.ppc64le",
"SUSE Manager Server 4.1:busybox-1.34.1-4.9.1.s390x",
"SUSE Manager Server 4.1:busybox-1.34.1-4.9.1.x86_64",
"SUSE Manager Server 4.1:busybox-static-1.34.1-4.9.1.ppc64le",
"SUSE Manager Server 4.1:busybox-static-1.34.1-4.9.1.s390x",
"SUSE Manager Server 4.1:busybox-static-1.34.1-4.9.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2016-2147",
"url": "https://www.suse.com/security/cve/CVE-2016-2147"
},
{
"category": "external",
"summary": "SUSE Bug 970663 for CVE-2016-2147",
"url": "https://bugzilla.suse.com/970663"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Enterprise Storage 6:busybox-1.34.1-4.9.1.aarch64",
"SUSE Enterprise Storage 6:busybox-1.34.1-4.9.1.x86_64",
"SUSE Enterprise Storage 6:busybox-static-1.34.1-4.9.1.aarch64",
"SUSE Enterprise Storage 6:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Enterprise Storage 7:busybox-1.34.1-4.9.1.aarch64",
"SUSE Enterprise Storage 7:busybox-1.34.1-4.9.1.x86_64",
"SUSE Enterprise Storage 7:busybox-static-1.34.1-4.9.1.aarch64",
"SUSE Enterprise Storage 7:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-static-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:busybox-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:busybox-static-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:busybox-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:busybox-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:busybox-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.34.1-4.9.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.34.1-4.9.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.34.1-4.9.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.34.1-4.9.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.34.1-4.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.34.1-4.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-1.34.1-4.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-1.34.1-4.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:busybox-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:busybox-1.34.1-4.9.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:busybox-1.34.1-4.9.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-1.34.1-4.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-static-1.34.1-4.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:busybox-1.34.1-4.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:busybox-static-1.34.1-4.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:busybox-1.34.1-4.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:busybox-1.34.1-4.9.1.x86_64",
"SUSE Manager Proxy 4.1:busybox-1.34.1-4.9.1.x86_64",
"SUSE Manager Proxy 4.1:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:busybox-1.34.1-4.9.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Manager Server 4.1:busybox-1.34.1-4.9.1.ppc64le",
"SUSE Manager Server 4.1:busybox-1.34.1-4.9.1.s390x",
"SUSE Manager Server 4.1:busybox-1.34.1-4.9.1.x86_64",
"SUSE Manager Server 4.1:busybox-static-1.34.1-4.9.1.ppc64le",
"SUSE Manager Server 4.1:busybox-static-1.34.1-4.9.1.s390x",
"SUSE Manager Server 4.1:busybox-static-1.34.1-4.9.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Enterprise Storage 6:busybox-1.34.1-4.9.1.aarch64",
"SUSE Enterprise Storage 6:busybox-1.34.1-4.9.1.x86_64",
"SUSE Enterprise Storage 6:busybox-static-1.34.1-4.9.1.aarch64",
"SUSE Enterprise Storage 6:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Enterprise Storage 7:busybox-1.34.1-4.9.1.aarch64",
"SUSE Enterprise Storage 7:busybox-1.34.1-4.9.1.x86_64",
"SUSE Enterprise Storage 7:busybox-static-1.34.1-4.9.1.aarch64",
"SUSE Enterprise Storage 7:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-static-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:busybox-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:busybox-static-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:busybox-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:busybox-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:busybox-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.34.1-4.9.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.34.1-4.9.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.34.1-4.9.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.34.1-4.9.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.34.1-4.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.34.1-4.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-1.34.1-4.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-1.34.1-4.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:busybox-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:busybox-1.34.1-4.9.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:busybox-1.34.1-4.9.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-1.34.1-4.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-static-1.34.1-4.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:busybox-1.34.1-4.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:busybox-static-1.34.1-4.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:busybox-1.34.1-4.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:busybox-1.34.1-4.9.1.x86_64",
"SUSE Manager Proxy 4.1:busybox-1.34.1-4.9.1.x86_64",
"SUSE Manager Proxy 4.1:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:busybox-1.34.1-4.9.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Manager Server 4.1:busybox-1.34.1-4.9.1.ppc64le",
"SUSE Manager Server 4.1:busybox-1.34.1-4.9.1.s390x",
"SUSE Manager Server 4.1:busybox-1.34.1-4.9.1.x86_64",
"SUSE Manager Server 4.1:busybox-static-1.34.1-4.9.1.ppc64le",
"SUSE Manager Server 4.1:busybox-static-1.34.1-4.9.1.s390x",
"SUSE Manager Server 4.1:busybox-static-1.34.1-4.9.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-01-20T09:05:15Z",
"details": "important"
}
],
"title": "CVE-2016-2147"
},
{
"cve": "CVE-2016-2148",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2016-2148"
}
],
"notes": [
{
"category": "general",
"text": "Heap-based buffer overflow in the DHCP client (udhcpc) in BusyBox before 1.25.0 allows remote attackers to have unspecified impact via vectors involving OPTION_6RD parsing.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Enterprise Storage 6:busybox-1.34.1-4.9.1.aarch64",
"SUSE Enterprise Storage 6:busybox-1.34.1-4.9.1.x86_64",
"SUSE Enterprise Storage 6:busybox-static-1.34.1-4.9.1.aarch64",
"SUSE Enterprise Storage 6:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Enterprise Storage 7:busybox-1.34.1-4.9.1.aarch64",
"SUSE Enterprise Storage 7:busybox-1.34.1-4.9.1.x86_64",
"SUSE Enterprise Storage 7:busybox-static-1.34.1-4.9.1.aarch64",
"SUSE Enterprise Storage 7:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-static-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:busybox-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:busybox-static-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:busybox-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:busybox-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:busybox-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.34.1-4.9.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.34.1-4.9.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.34.1-4.9.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.34.1-4.9.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.34.1-4.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.34.1-4.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-1.34.1-4.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-1.34.1-4.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:busybox-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:busybox-1.34.1-4.9.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:busybox-1.34.1-4.9.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-1.34.1-4.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-static-1.34.1-4.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:busybox-1.34.1-4.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:busybox-static-1.34.1-4.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:busybox-1.34.1-4.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:busybox-1.34.1-4.9.1.x86_64",
"SUSE Manager Proxy 4.1:busybox-1.34.1-4.9.1.x86_64",
"SUSE Manager Proxy 4.1:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:busybox-1.34.1-4.9.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Manager Server 4.1:busybox-1.34.1-4.9.1.ppc64le",
"SUSE Manager Server 4.1:busybox-1.34.1-4.9.1.s390x",
"SUSE Manager Server 4.1:busybox-1.34.1-4.9.1.x86_64",
"SUSE Manager Server 4.1:busybox-static-1.34.1-4.9.1.ppc64le",
"SUSE Manager Server 4.1:busybox-static-1.34.1-4.9.1.s390x",
"SUSE Manager Server 4.1:busybox-static-1.34.1-4.9.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2016-2148",
"url": "https://www.suse.com/security/cve/CVE-2016-2148"
},
{
"category": "external",
"summary": "SUSE Bug 970662 for CVE-2016-2148",
"url": "https://bugzilla.suse.com/970662"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Enterprise Storage 6:busybox-1.34.1-4.9.1.aarch64",
"SUSE Enterprise Storage 6:busybox-1.34.1-4.9.1.x86_64",
"SUSE Enterprise Storage 6:busybox-static-1.34.1-4.9.1.aarch64",
"SUSE Enterprise Storage 6:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Enterprise Storage 7:busybox-1.34.1-4.9.1.aarch64",
"SUSE Enterprise Storage 7:busybox-1.34.1-4.9.1.x86_64",
"SUSE Enterprise Storage 7:busybox-static-1.34.1-4.9.1.aarch64",
"SUSE Enterprise Storage 7:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-static-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:busybox-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:busybox-static-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:busybox-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:busybox-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:busybox-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.34.1-4.9.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.34.1-4.9.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.34.1-4.9.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.34.1-4.9.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.34.1-4.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.34.1-4.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-1.34.1-4.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-1.34.1-4.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:busybox-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:busybox-1.34.1-4.9.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:busybox-1.34.1-4.9.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-1.34.1-4.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-static-1.34.1-4.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:busybox-1.34.1-4.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:busybox-static-1.34.1-4.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:busybox-1.34.1-4.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:busybox-1.34.1-4.9.1.x86_64",
"SUSE Manager Proxy 4.1:busybox-1.34.1-4.9.1.x86_64",
"SUSE Manager Proxy 4.1:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:busybox-1.34.1-4.9.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Manager Server 4.1:busybox-1.34.1-4.9.1.ppc64le",
"SUSE Manager Server 4.1:busybox-1.34.1-4.9.1.s390x",
"SUSE Manager Server 4.1:busybox-1.34.1-4.9.1.x86_64",
"SUSE Manager Server 4.1:busybox-static-1.34.1-4.9.1.ppc64le",
"SUSE Manager Server 4.1:busybox-static-1.34.1-4.9.1.s390x",
"SUSE Manager Server 4.1:busybox-static-1.34.1-4.9.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Enterprise Storage 6:busybox-1.34.1-4.9.1.aarch64",
"SUSE Enterprise Storage 6:busybox-1.34.1-4.9.1.x86_64",
"SUSE Enterprise Storage 6:busybox-static-1.34.1-4.9.1.aarch64",
"SUSE Enterprise Storage 6:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Enterprise Storage 7:busybox-1.34.1-4.9.1.aarch64",
"SUSE Enterprise Storage 7:busybox-1.34.1-4.9.1.x86_64",
"SUSE Enterprise Storage 7:busybox-static-1.34.1-4.9.1.aarch64",
"SUSE Enterprise Storage 7:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-static-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:busybox-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:busybox-static-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:busybox-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:busybox-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:busybox-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.34.1-4.9.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.34.1-4.9.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.34.1-4.9.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.34.1-4.9.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.34.1-4.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.34.1-4.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-1.34.1-4.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-1.34.1-4.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:busybox-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:busybox-1.34.1-4.9.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:busybox-1.34.1-4.9.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-1.34.1-4.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-static-1.34.1-4.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:busybox-1.34.1-4.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:busybox-static-1.34.1-4.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:busybox-1.34.1-4.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:busybox-1.34.1-4.9.1.x86_64",
"SUSE Manager Proxy 4.1:busybox-1.34.1-4.9.1.x86_64",
"SUSE Manager Proxy 4.1:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:busybox-1.34.1-4.9.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Manager Server 4.1:busybox-1.34.1-4.9.1.ppc64le",
"SUSE Manager Server 4.1:busybox-1.34.1-4.9.1.s390x",
"SUSE Manager Server 4.1:busybox-1.34.1-4.9.1.x86_64",
"SUSE Manager Server 4.1:busybox-static-1.34.1-4.9.1.ppc64le",
"SUSE Manager Server 4.1:busybox-static-1.34.1-4.9.1.s390x",
"SUSE Manager Server 4.1:busybox-static-1.34.1-4.9.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-01-20T09:05:15Z",
"details": "moderate"
}
],
"title": "CVE-2016-2148"
},
{
"cve": "CVE-2016-6301",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2016-6301"
}
],
"notes": [
{
"category": "general",
"text": "The recv_and_process_client_pkt function in networking/ntpd.c in busybox allows remote attackers to cause a denial of service (CPU and bandwidth consumption) via a forged NTP packet, which triggers a communication loop.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Enterprise Storage 6:busybox-1.34.1-4.9.1.aarch64",
"SUSE Enterprise Storage 6:busybox-1.34.1-4.9.1.x86_64",
"SUSE Enterprise Storage 6:busybox-static-1.34.1-4.9.1.aarch64",
"SUSE Enterprise Storage 6:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Enterprise Storage 7:busybox-1.34.1-4.9.1.aarch64",
"SUSE Enterprise Storage 7:busybox-1.34.1-4.9.1.x86_64",
"SUSE Enterprise Storage 7:busybox-static-1.34.1-4.9.1.aarch64",
"SUSE Enterprise Storage 7:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-static-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:busybox-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:busybox-static-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:busybox-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:busybox-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:busybox-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.34.1-4.9.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.34.1-4.9.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.34.1-4.9.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.34.1-4.9.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.34.1-4.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.34.1-4.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-1.34.1-4.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-1.34.1-4.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:busybox-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:busybox-1.34.1-4.9.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:busybox-1.34.1-4.9.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-1.34.1-4.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-static-1.34.1-4.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:busybox-1.34.1-4.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:busybox-static-1.34.1-4.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:busybox-1.34.1-4.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:busybox-1.34.1-4.9.1.x86_64",
"SUSE Manager Proxy 4.1:busybox-1.34.1-4.9.1.x86_64",
"SUSE Manager Proxy 4.1:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:busybox-1.34.1-4.9.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Manager Server 4.1:busybox-1.34.1-4.9.1.ppc64le",
"SUSE Manager Server 4.1:busybox-1.34.1-4.9.1.s390x",
"SUSE Manager Server 4.1:busybox-1.34.1-4.9.1.x86_64",
"SUSE Manager Server 4.1:busybox-static-1.34.1-4.9.1.ppc64le",
"SUSE Manager Server 4.1:busybox-static-1.34.1-4.9.1.s390x",
"SUSE Manager Server 4.1:busybox-static-1.34.1-4.9.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2016-6301",
"url": "https://www.suse.com/security/cve/CVE-2016-6301"
},
{
"category": "external",
"summary": "SUSE Bug 991940 for CVE-2016-6301",
"url": "https://bugzilla.suse.com/991940"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Enterprise Storage 6:busybox-1.34.1-4.9.1.aarch64",
"SUSE Enterprise Storage 6:busybox-1.34.1-4.9.1.x86_64",
"SUSE Enterprise Storage 6:busybox-static-1.34.1-4.9.1.aarch64",
"SUSE Enterprise Storage 6:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Enterprise Storage 7:busybox-1.34.1-4.9.1.aarch64",
"SUSE Enterprise Storage 7:busybox-1.34.1-4.9.1.x86_64",
"SUSE Enterprise Storage 7:busybox-static-1.34.1-4.9.1.aarch64",
"SUSE Enterprise Storage 7:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-static-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:busybox-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:busybox-static-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:busybox-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:busybox-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:busybox-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.34.1-4.9.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.34.1-4.9.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.34.1-4.9.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.34.1-4.9.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.34.1-4.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.34.1-4.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-1.34.1-4.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-1.34.1-4.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:busybox-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:busybox-1.34.1-4.9.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:busybox-1.34.1-4.9.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-1.34.1-4.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-static-1.34.1-4.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:busybox-1.34.1-4.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:busybox-static-1.34.1-4.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:busybox-1.34.1-4.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:busybox-1.34.1-4.9.1.x86_64",
"SUSE Manager Proxy 4.1:busybox-1.34.1-4.9.1.x86_64",
"SUSE Manager Proxy 4.1:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:busybox-1.34.1-4.9.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Manager Server 4.1:busybox-1.34.1-4.9.1.ppc64le",
"SUSE Manager Server 4.1:busybox-1.34.1-4.9.1.s390x",
"SUSE Manager Server 4.1:busybox-1.34.1-4.9.1.x86_64",
"SUSE Manager Server 4.1:busybox-static-1.34.1-4.9.1.ppc64le",
"SUSE Manager Server 4.1:busybox-static-1.34.1-4.9.1.s390x",
"SUSE Manager Server 4.1:busybox-static-1.34.1-4.9.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"SUSE Enterprise Storage 6:busybox-1.34.1-4.9.1.aarch64",
"SUSE Enterprise Storage 6:busybox-1.34.1-4.9.1.x86_64",
"SUSE Enterprise Storage 6:busybox-static-1.34.1-4.9.1.aarch64",
"SUSE Enterprise Storage 6:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Enterprise Storage 7:busybox-1.34.1-4.9.1.aarch64",
"SUSE Enterprise Storage 7:busybox-1.34.1-4.9.1.x86_64",
"SUSE Enterprise Storage 7:busybox-static-1.34.1-4.9.1.aarch64",
"SUSE Enterprise Storage 7:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-static-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:busybox-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:busybox-static-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:busybox-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:busybox-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:busybox-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.34.1-4.9.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.34.1-4.9.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.34.1-4.9.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.34.1-4.9.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.34.1-4.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.34.1-4.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-1.34.1-4.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-1.34.1-4.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:busybox-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:busybox-1.34.1-4.9.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:busybox-1.34.1-4.9.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-1.34.1-4.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-static-1.34.1-4.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:busybox-1.34.1-4.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:busybox-static-1.34.1-4.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:busybox-1.34.1-4.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:busybox-1.34.1-4.9.1.x86_64",
"SUSE Manager Proxy 4.1:busybox-1.34.1-4.9.1.x86_64",
"SUSE Manager Proxy 4.1:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:busybox-1.34.1-4.9.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Manager Server 4.1:busybox-1.34.1-4.9.1.ppc64le",
"SUSE Manager Server 4.1:busybox-1.34.1-4.9.1.s390x",
"SUSE Manager Server 4.1:busybox-1.34.1-4.9.1.x86_64",
"SUSE Manager Server 4.1:busybox-static-1.34.1-4.9.1.ppc64le",
"SUSE Manager Server 4.1:busybox-static-1.34.1-4.9.1.s390x",
"SUSE Manager Server 4.1:busybox-static-1.34.1-4.9.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-01-20T09:05:15Z",
"details": "moderate"
}
],
"title": "CVE-2016-6301"
},
{
"cve": "CVE-2017-15873",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-15873"
}
],
"notes": [
{
"category": "general",
"text": "The get_next_block function in archival/libarchive/decompress_bunzip2.c in BusyBox 1.27.2 has an Integer Overflow that may lead to a write access violation.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Enterprise Storage 6:busybox-1.34.1-4.9.1.aarch64",
"SUSE Enterprise Storage 6:busybox-1.34.1-4.9.1.x86_64",
"SUSE Enterprise Storage 6:busybox-static-1.34.1-4.9.1.aarch64",
"SUSE Enterprise Storage 6:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Enterprise Storage 7:busybox-1.34.1-4.9.1.aarch64",
"SUSE Enterprise Storage 7:busybox-1.34.1-4.9.1.x86_64",
"SUSE Enterprise Storage 7:busybox-static-1.34.1-4.9.1.aarch64",
"SUSE Enterprise Storage 7:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-static-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:busybox-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:busybox-static-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:busybox-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:busybox-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:busybox-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.34.1-4.9.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.34.1-4.9.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.34.1-4.9.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.34.1-4.9.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.34.1-4.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.34.1-4.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-1.34.1-4.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-1.34.1-4.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:busybox-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:busybox-1.34.1-4.9.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:busybox-1.34.1-4.9.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-1.34.1-4.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-static-1.34.1-4.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:busybox-1.34.1-4.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:busybox-static-1.34.1-4.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:busybox-1.34.1-4.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:busybox-1.34.1-4.9.1.x86_64",
"SUSE Manager Proxy 4.1:busybox-1.34.1-4.9.1.x86_64",
"SUSE Manager Proxy 4.1:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:busybox-1.34.1-4.9.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Manager Server 4.1:busybox-1.34.1-4.9.1.ppc64le",
"SUSE Manager Server 4.1:busybox-1.34.1-4.9.1.s390x",
"SUSE Manager Server 4.1:busybox-1.34.1-4.9.1.x86_64",
"SUSE Manager Server 4.1:busybox-static-1.34.1-4.9.1.ppc64le",
"SUSE Manager Server 4.1:busybox-static-1.34.1-4.9.1.s390x",
"SUSE Manager Server 4.1:busybox-static-1.34.1-4.9.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-15873",
"url": "https://www.suse.com/security/cve/CVE-2017-15873"
},
{
"category": "external",
"summary": "SUSE Bug 1064976 for CVE-2017-15873",
"url": "https://bugzilla.suse.com/1064976"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Enterprise Storage 6:busybox-1.34.1-4.9.1.aarch64",
"SUSE Enterprise Storage 6:busybox-1.34.1-4.9.1.x86_64",
"SUSE Enterprise Storage 6:busybox-static-1.34.1-4.9.1.aarch64",
"SUSE Enterprise Storage 6:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Enterprise Storage 7:busybox-1.34.1-4.9.1.aarch64",
"SUSE Enterprise Storage 7:busybox-1.34.1-4.9.1.x86_64",
"SUSE Enterprise Storage 7:busybox-static-1.34.1-4.9.1.aarch64",
"SUSE Enterprise Storage 7:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-static-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:busybox-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:busybox-static-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:busybox-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:busybox-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:busybox-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.34.1-4.9.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.34.1-4.9.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.34.1-4.9.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.34.1-4.9.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.34.1-4.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.34.1-4.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-1.34.1-4.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-1.34.1-4.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:busybox-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:busybox-1.34.1-4.9.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:busybox-1.34.1-4.9.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-1.34.1-4.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-static-1.34.1-4.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:busybox-1.34.1-4.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:busybox-static-1.34.1-4.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:busybox-1.34.1-4.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:busybox-1.34.1-4.9.1.x86_64",
"SUSE Manager Proxy 4.1:busybox-1.34.1-4.9.1.x86_64",
"SUSE Manager Proxy 4.1:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:busybox-1.34.1-4.9.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Manager Server 4.1:busybox-1.34.1-4.9.1.ppc64le",
"SUSE Manager Server 4.1:busybox-1.34.1-4.9.1.s390x",
"SUSE Manager Server 4.1:busybox-1.34.1-4.9.1.x86_64",
"SUSE Manager Server 4.1:busybox-static-1.34.1-4.9.1.ppc64le",
"SUSE Manager Server 4.1:busybox-static-1.34.1-4.9.1.s390x",
"SUSE Manager Server 4.1:busybox-static-1.34.1-4.9.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"SUSE Enterprise Storage 6:busybox-1.34.1-4.9.1.aarch64",
"SUSE Enterprise Storage 6:busybox-1.34.1-4.9.1.x86_64",
"SUSE Enterprise Storage 6:busybox-static-1.34.1-4.9.1.aarch64",
"SUSE Enterprise Storage 6:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Enterprise Storage 7:busybox-1.34.1-4.9.1.aarch64",
"SUSE Enterprise Storage 7:busybox-1.34.1-4.9.1.x86_64",
"SUSE Enterprise Storage 7:busybox-static-1.34.1-4.9.1.aarch64",
"SUSE Enterprise Storage 7:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-static-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:busybox-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:busybox-static-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:busybox-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:busybox-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:busybox-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.34.1-4.9.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.34.1-4.9.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.34.1-4.9.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.34.1-4.9.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.34.1-4.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.34.1-4.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-1.34.1-4.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-1.34.1-4.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:busybox-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:busybox-1.34.1-4.9.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:busybox-1.34.1-4.9.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-1.34.1-4.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-static-1.34.1-4.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:busybox-1.34.1-4.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:busybox-static-1.34.1-4.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:busybox-1.34.1-4.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:busybox-1.34.1-4.9.1.x86_64",
"SUSE Manager Proxy 4.1:busybox-1.34.1-4.9.1.x86_64",
"SUSE Manager Proxy 4.1:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:busybox-1.34.1-4.9.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Manager Server 4.1:busybox-1.34.1-4.9.1.ppc64le",
"SUSE Manager Server 4.1:busybox-1.34.1-4.9.1.s390x",
"SUSE Manager Server 4.1:busybox-1.34.1-4.9.1.x86_64",
"SUSE Manager Server 4.1:busybox-static-1.34.1-4.9.1.ppc64le",
"SUSE Manager Server 4.1:busybox-static-1.34.1-4.9.1.s390x",
"SUSE Manager Server 4.1:busybox-static-1.34.1-4.9.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-01-20T09:05:15Z",
"details": "moderate"
}
],
"title": "CVE-2017-15873"
},
{
"cve": "CVE-2017-15874",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-15874"
}
],
"notes": [
{
"category": "general",
"text": "archival/libarchive/decompress_unlzma.c in BusyBox 1.27.2 has an Integer Underflow that leads to a read access violation.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Enterprise Storage 6:busybox-1.34.1-4.9.1.aarch64",
"SUSE Enterprise Storage 6:busybox-1.34.1-4.9.1.x86_64",
"SUSE Enterprise Storage 6:busybox-static-1.34.1-4.9.1.aarch64",
"SUSE Enterprise Storage 6:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Enterprise Storage 7:busybox-1.34.1-4.9.1.aarch64",
"SUSE Enterprise Storage 7:busybox-1.34.1-4.9.1.x86_64",
"SUSE Enterprise Storage 7:busybox-static-1.34.1-4.9.1.aarch64",
"SUSE Enterprise Storage 7:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-static-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:busybox-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:busybox-static-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:busybox-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:busybox-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:busybox-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.34.1-4.9.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.34.1-4.9.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.34.1-4.9.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.34.1-4.9.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.34.1-4.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.34.1-4.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-1.34.1-4.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-1.34.1-4.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:busybox-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:busybox-1.34.1-4.9.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:busybox-1.34.1-4.9.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-1.34.1-4.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-static-1.34.1-4.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:busybox-1.34.1-4.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:busybox-static-1.34.1-4.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:busybox-1.34.1-4.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:busybox-1.34.1-4.9.1.x86_64",
"SUSE Manager Proxy 4.1:busybox-1.34.1-4.9.1.x86_64",
"SUSE Manager Proxy 4.1:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:busybox-1.34.1-4.9.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Manager Server 4.1:busybox-1.34.1-4.9.1.ppc64le",
"SUSE Manager Server 4.1:busybox-1.34.1-4.9.1.s390x",
"SUSE Manager Server 4.1:busybox-1.34.1-4.9.1.x86_64",
"SUSE Manager Server 4.1:busybox-static-1.34.1-4.9.1.ppc64le",
"SUSE Manager Server 4.1:busybox-static-1.34.1-4.9.1.s390x",
"SUSE Manager Server 4.1:busybox-static-1.34.1-4.9.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-15874",
"url": "https://www.suse.com/security/cve/CVE-2017-15874"
},
{
"category": "external",
"summary": "SUSE Bug 1064978 for CVE-2017-15874",
"url": "https://bugzilla.suse.com/1064978"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Enterprise Storage 6:busybox-1.34.1-4.9.1.aarch64",
"SUSE Enterprise Storage 6:busybox-1.34.1-4.9.1.x86_64",
"SUSE Enterprise Storage 6:busybox-static-1.34.1-4.9.1.aarch64",
"SUSE Enterprise Storage 6:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Enterprise Storage 7:busybox-1.34.1-4.9.1.aarch64",
"SUSE Enterprise Storage 7:busybox-1.34.1-4.9.1.x86_64",
"SUSE Enterprise Storage 7:busybox-static-1.34.1-4.9.1.aarch64",
"SUSE Enterprise Storage 7:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-static-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:busybox-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:busybox-static-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:busybox-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:busybox-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:busybox-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.34.1-4.9.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.34.1-4.9.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.34.1-4.9.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.34.1-4.9.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.34.1-4.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.34.1-4.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-1.34.1-4.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-1.34.1-4.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:busybox-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:busybox-1.34.1-4.9.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:busybox-1.34.1-4.9.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-1.34.1-4.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-static-1.34.1-4.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:busybox-1.34.1-4.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:busybox-static-1.34.1-4.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:busybox-1.34.1-4.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:busybox-1.34.1-4.9.1.x86_64",
"SUSE Manager Proxy 4.1:busybox-1.34.1-4.9.1.x86_64",
"SUSE Manager Proxy 4.1:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:busybox-1.34.1-4.9.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Manager Server 4.1:busybox-1.34.1-4.9.1.ppc64le",
"SUSE Manager Server 4.1:busybox-1.34.1-4.9.1.s390x",
"SUSE Manager Server 4.1:busybox-1.34.1-4.9.1.x86_64",
"SUSE Manager Server 4.1:busybox-static-1.34.1-4.9.1.ppc64le",
"SUSE Manager Server 4.1:busybox-static-1.34.1-4.9.1.s390x",
"SUSE Manager Server 4.1:busybox-static-1.34.1-4.9.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.3,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L",
"version": "3.0"
},
"products": [
"SUSE Enterprise Storage 6:busybox-1.34.1-4.9.1.aarch64",
"SUSE Enterprise Storage 6:busybox-1.34.1-4.9.1.x86_64",
"SUSE Enterprise Storage 6:busybox-static-1.34.1-4.9.1.aarch64",
"SUSE Enterprise Storage 6:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Enterprise Storage 7:busybox-1.34.1-4.9.1.aarch64",
"SUSE Enterprise Storage 7:busybox-1.34.1-4.9.1.x86_64",
"SUSE Enterprise Storage 7:busybox-static-1.34.1-4.9.1.aarch64",
"SUSE Enterprise Storage 7:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-static-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:busybox-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:busybox-static-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:busybox-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:busybox-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:busybox-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.34.1-4.9.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.34.1-4.9.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.34.1-4.9.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.34.1-4.9.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.34.1-4.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.34.1-4.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-1.34.1-4.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-1.34.1-4.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:busybox-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:busybox-1.34.1-4.9.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:busybox-1.34.1-4.9.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-1.34.1-4.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-static-1.34.1-4.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:busybox-1.34.1-4.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:busybox-static-1.34.1-4.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:busybox-1.34.1-4.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:busybox-1.34.1-4.9.1.x86_64",
"SUSE Manager Proxy 4.1:busybox-1.34.1-4.9.1.x86_64",
"SUSE Manager Proxy 4.1:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:busybox-1.34.1-4.9.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Manager Server 4.1:busybox-1.34.1-4.9.1.ppc64le",
"SUSE Manager Server 4.1:busybox-1.34.1-4.9.1.s390x",
"SUSE Manager Server 4.1:busybox-1.34.1-4.9.1.x86_64",
"SUSE Manager Server 4.1:busybox-static-1.34.1-4.9.1.ppc64le",
"SUSE Manager Server 4.1:busybox-static-1.34.1-4.9.1.s390x",
"SUSE Manager Server 4.1:busybox-static-1.34.1-4.9.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-01-20T09:05:15Z",
"details": "low"
}
],
"title": "CVE-2017-15874"
},
{
"cve": "CVE-2017-16544",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-16544"
}
],
"notes": [
{
"category": "general",
"text": "In the add_match function in libbb/lineedit.c in BusyBox through 1.27.2, the tab autocomplete feature of the shell, used to get a list of filenames in a directory, does not sanitize filenames and results in executing any escape sequence in the terminal. This could potentially result in code execution, arbitrary file writes, or other attacks.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Enterprise Storage 6:busybox-1.34.1-4.9.1.aarch64",
"SUSE Enterprise Storage 6:busybox-1.34.1-4.9.1.x86_64",
"SUSE Enterprise Storage 6:busybox-static-1.34.1-4.9.1.aarch64",
"SUSE Enterprise Storage 6:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Enterprise Storage 7:busybox-1.34.1-4.9.1.aarch64",
"SUSE Enterprise Storage 7:busybox-1.34.1-4.9.1.x86_64",
"SUSE Enterprise Storage 7:busybox-static-1.34.1-4.9.1.aarch64",
"SUSE Enterprise Storage 7:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-static-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:busybox-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:busybox-static-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:busybox-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:busybox-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:busybox-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.34.1-4.9.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.34.1-4.9.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.34.1-4.9.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.34.1-4.9.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.34.1-4.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.34.1-4.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-1.34.1-4.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-1.34.1-4.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:busybox-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:busybox-1.34.1-4.9.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:busybox-1.34.1-4.9.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-1.34.1-4.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-static-1.34.1-4.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:busybox-1.34.1-4.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:busybox-static-1.34.1-4.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:busybox-1.34.1-4.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:busybox-1.34.1-4.9.1.x86_64",
"SUSE Manager Proxy 4.1:busybox-1.34.1-4.9.1.x86_64",
"SUSE Manager Proxy 4.1:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:busybox-1.34.1-4.9.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Manager Server 4.1:busybox-1.34.1-4.9.1.ppc64le",
"SUSE Manager Server 4.1:busybox-1.34.1-4.9.1.s390x",
"SUSE Manager Server 4.1:busybox-1.34.1-4.9.1.x86_64",
"SUSE Manager Server 4.1:busybox-static-1.34.1-4.9.1.ppc64le",
"SUSE Manager Server 4.1:busybox-static-1.34.1-4.9.1.s390x",
"SUSE Manager Server 4.1:busybox-static-1.34.1-4.9.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-16544",
"url": "https://www.suse.com/security/cve/CVE-2017-16544"
},
{
"category": "external",
"summary": "SUSE Bug 1069412 for CVE-2017-16544",
"url": "https://bugzilla.suse.com/1069412"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Enterprise Storage 6:busybox-1.34.1-4.9.1.aarch64",
"SUSE Enterprise Storage 6:busybox-1.34.1-4.9.1.x86_64",
"SUSE Enterprise Storage 6:busybox-static-1.34.1-4.9.1.aarch64",
"SUSE Enterprise Storage 6:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Enterprise Storage 7:busybox-1.34.1-4.9.1.aarch64",
"SUSE Enterprise Storage 7:busybox-1.34.1-4.9.1.x86_64",
"SUSE Enterprise Storage 7:busybox-static-1.34.1-4.9.1.aarch64",
"SUSE Enterprise Storage 7:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-static-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:busybox-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:busybox-static-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:busybox-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:busybox-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:busybox-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.34.1-4.9.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.34.1-4.9.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.34.1-4.9.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.34.1-4.9.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.34.1-4.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.34.1-4.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-1.34.1-4.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-1.34.1-4.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:busybox-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:busybox-1.34.1-4.9.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:busybox-1.34.1-4.9.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-1.34.1-4.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-static-1.34.1-4.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:busybox-1.34.1-4.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:busybox-static-1.34.1-4.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:busybox-1.34.1-4.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:busybox-1.34.1-4.9.1.x86_64",
"SUSE Manager Proxy 4.1:busybox-1.34.1-4.9.1.x86_64",
"SUSE Manager Proxy 4.1:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:busybox-1.34.1-4.9.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Manager Server 4.1:busybox-1.34.1-4.9.1.ppc64le",
"SUSE Manager Server 4.1:busybox-1.34.1-4.9.1.s390x",
"SUSE Manager Server 4.1:busybox-1.34.1-4.9.1.x86_64",
"SUSE Manager Server 4.1:busybox-static-1.34.1-4.9.1.ppc64le",
"SUSE Manager Server 4.1:busybox-static-1.34.1-4.9.1.s390x",
"SUSE Manager Server 4.1:busybox-static-1.34.1-4.9.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"SUSE Enterprise Storage 6:busybox-1.34.1-4.9.1.aarch64",
"SUSE Enterprise Storage 6:busybox-1.34.1-4.9.1.x86_64",
"SUSE Enterprise Storage 6:busybox-static-1.34.1-4.9.1.aarch64",
"SUSE Enterprise Storage 6:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Enterprise Storage 7:busybox-1.34.1-4.9.1.aarch64",
"SUSE Enterprise Storage 7:busybox-1.34.1-4.9.1.x86_64",
"SUSE Enterprise Storage 7:busybox-static-1.34.1-4.9.1.aarch64",
"SUSE Enterprise Storage 7:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-static-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:busybox-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:busybox-static-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:busybox-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:busybox-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:busybox-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.34.1-4.9.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.34.1-4.9.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.34.1-4.9.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.34.1-4.9.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.34.1-4.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.34.1-4.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-1.34.1-4.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-1.34.1-4.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:busybox-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:busybox-1.34.1-4.9.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:busybox-1.34.1-4.9.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-1.34.1-4.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-static-1.34.1-4.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:busybox-1.34.1-4.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:busybox-static-1.34.1-4.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:busybox-1.34.1-4.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:busybox-1.34.1-4.9.1.x86_64",
"SUSE Manager Proxy 4.1:busybox-1.34.1-4.9.1.x86_64",
"SUSE Manager Proxy 4.1:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:busybox-1.34.1-4.9.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Manager Server 4.1:busybox-1.34.1-4.9.1.ppc64le",
"SUSE Manager Server 4.1:busybox-1.34.1-4.9.1.s390x",
"SUSE Manager Server 4.1:busybox-1.34.1-4.9.1.x86_64",
"SUSE Manager Server 4.1:busybox-static-1.34.1-4.9.1.ppc64le",
"SUSE Manager Server 4.1:busybox-static-1.34.1-4.9.1.s390x",
"SUSE Manager Server 4.1:busybox-static-1.34.1-4.9.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-01-20T09:05:15Z",
"details": "moderate"
}
],
"title": "CVE-2017-16544"
},
{
"cve": "CVE-2018-1000500",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2018-1000500"
}
],
"notes": [
{
"category": "general",
"text": "Busybox contains a Missing SSL certificate validation vulnerability in The \"busybox wget\" applet that can result in arbitrary code execution. This attack appear to be exploitable via Simply download any file over HTTPS using \"busybox wget https://compromised-domain.com/important-file\".",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Enterprise Storage 6:busybox-1.34.1-4.9.1.aarch64",
"SUSE Enterprise Storage 6:busybox-1.34.1-4.9.1.x86_64",
"SUSE Enterprise Storage 6:busybox-static-1.34.1-4.9.1.aarch64",
"SUSE Enterprise Storage 6:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Enterprise Storage 7:busybox-1.34.1-4.9.1.aarch64",
"SUSE Enterprise Storage 7:busybox-1.34.1-4.9.1.x86_64",
"SUSE Enterprise Storage 7:busybox-static-1.34.1-4.9.1.aarch64",
"SUSE Enterprise Storage 7:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-static-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:busybox-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:busybox-static-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:busybox-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:busybox-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:busybox-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.34.1-4.9.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.34.1-4.9.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.34.1-4.9.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.34.1-4.9.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.34.1-4.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.34.1-4.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-1.34.1-4.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-1.34.1-4.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:busybox-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:busybox-1.34.1-4.9.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:busybox-1.34.1-4.9.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-1.34.1-4.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-static-1.34.1-4.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:busybox-1.34.1-4.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:busybox-static-1.34.1-4.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:busybox-1.34.1-4.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:busybox-1.34.1-4.9.1.x86_64",
"SUSE Manager Proxy 4.1:busybox-1.34.1-4.9.1.x86_64",
"SUSE Manager Proxy 4.1:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:busybox-1.34.1-4.9.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Manager Server 4.1:busybox-1.34.1-4.9.1.ppc64le",
"SUSE Manager Server 4.1:busybox-1.34.1-4.9.1.s390x",
"SUSE Manager Server 4.1:busybox-1.34.1-4.9.1.x86_64",
"SUSE Manager Server 4.1:busybox-static-1.34.1-4.9.1.ppc64le",
"SUSE Manager Server 4.1:busybox-static-1.34.1-4.9.1.s390x",
"SUSE Manager Server 4.1:busybox-static-1.34.1-4.9.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2018-1000500",
"url": "https://www.suse.com/security/cve/CVE-2018-1000500"
},
{
"category": "external",
"summary": "SUSE Bug 1099263 for CVE-2018-1000500",
"url": "https://bugzilla.suse.com/1099263"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Enterprise Storage 6:busybox-1.34.1-4.9.1.aarch64",
"SUSE Enterprise Storage 6:busybox-1.34.1-4.9.1.x86_64",
"SUSE Enterprise Storage 6:busybox-static-1.34.1-4.9.1.aarch64",
"SUSE Enterprise Storage 6:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Enterprise Storage 7:busybox-1.34.1-4.9.1.aarch64",
"SUSE Enterprise Storage 7:busybox-1.34.1-4.9.1.x86_64",
"SUSE Enterprise Storage 7:busybox-static-1.34.1-4.9.1.aarch64",
"SUSE Enterprise Storage 7:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-static-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:busybox-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:busybox-static-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:busybox-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:busybox-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:busybox-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.34.1-4.9.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.34.1-4.9.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.34.1-4.9.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.34.1-4.9.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.34.1-4.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.34.1-4.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-1.34.1-4.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-1.34.1-4.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:busybox-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:busybox-1.34.1-4.9.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:busybox-1.34.1-4.9.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-1.34.1-4.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-static-1.34.1-4.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:busybox-1.34.1-4.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:busybox-static-1.34.1-4.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:busybox-1.34.1-4.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:busybox-1.34.1-4.9.1.x86_64",
"SUSE Manager Proxy 4.1:busybox-1.34.1-4.9.1.x86_64",
"SUSE Manager Proxy 4.1:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:busybox-1.34.1-4.9.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Manager Server 4.1:busybox-1.34.1-4.9.1.ppc64le",
"SUSE Manager Server 4.1:busybox-1.34.1-4.9.1.s390x",
"SUSE Manager Server 4.1:busybox-1.34.1-4.9.1.x86_64",
"SUSE Manager Server 4.1:busybox-static-1.34.1-4.9.1.ppc64le",
"SUSE Manager Server 4.1:busybox-static-1.34.1-4.9.1.s390x",
"SUSE Manager Server 4.1:busybox-static-1.34.1-4.9.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N",
"version": "3.0"
},
"products": [
"SUSE Enterprise Storage 6:busybox-1.34.1-4.9.1.aarch64",
"SUSE Enterprise Storage 6:busybox-1.34.1-4.9.1.x86_64",
"SUSE Enterprise Storage 6:busybox-static-1.34.1-4.9.1.aarch64",
"SUSE Enterprise Storage 6:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Enterprise Storage 7:busybox-1.34.1-4.9.1.aarch64",
"SUSE Enterprise Storage 7:busybox-1.34.1-4.9.1.x86_64",
"SUSE Enterprise Storage 7:busybox-static-1.34.1-4.9.1.aarch64",
"SUSE Enterprise Storage 7:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-static-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:busybox-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:busybox-static-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:busybox-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:busybox-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:busybox-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.34.1-4.9.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.34.1-4.9.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.34.1-4.9.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.34.1-4.9.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.34.1-4.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.34.1-4.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-1.34.1-4.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-1.34.1-4.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:busybox-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:busybox-1.34.1-4.9.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:busybox-1.34.1-4.9.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-1.34.1-4.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-static-1.34.1-4.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:busybox-1.34.1-4.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:busybox-static-1.34.1-4.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:busybox-1.34.1-4.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:busybox-1.34.1-4.9.1.x86_64",
"SUSE Manager Proxy 4.1:busybox-1.34.1-4.9.1.x86_64",
"SUSE Manager Proxy 4.1:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:busybox-1.34.1-4.9.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Manager Server 4.1:busybox-1.34.1-4.9.1.ppc64le",
"SUSE Manager Server 4.1:busybox-1.34.1-4.9.1.s390x",
"SUSE Manager Server 4.1:busybox-1.34.1-4.9.1.x86_64",
"SUSE Manager Server 4.1:busybox-static-1.34.1-4.9.1.ppc64le",
"SUSE Manager Server 4.1:busybox-static-1.34.1-4.9.1.s390x",
"SUSE Manager Server 4.1:busybox-static-1.34.1-4.9.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-01-20T09:05:15Z",
"details": "important"
}
],
"title": "CVE-2018-1000500"
},
{
"cve": "CVE-2018-1000517",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2018-1000517"
}
],
"notes": [
{
"category": "general",
"text": "BusyBox project BusyBox wget version prior to commit 8e2174e9bd836e53c8b9c6e00d1bc6e2a718686e contains a Buffer Overflow vulnerability in Busybox wget that can result in heap buffer overflow. This attack appear to be exploitable via network connectivity. This vulnerability appears to have been fixed in after commit 8e2174e9bd836e53c8b9c6e00d1bc6e2a718686e.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Enterprise Storage 6:busybox-1.34.1-4.9.1.aarch64",
"SUSE Enterprise Storage 6:busybox-1.34.1-4.9.1.x86_64",
"SUSE Enterprise Storage 6:busybox-static-1.34.1-4.9.1.aarch64",
"SUSE Enterprise Storage 6:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Enterprise Storage 7:busybox-1.34.1-4.9.1.aarch64",
"SUSE Enterprise Storage 7:busybox-1.34.1-4.9.1.x86_64",
"SUSE Enterprise Storage 7:busybox-static-1.34.1-4.9.1.aarch64",
"SUSE Enterprise Storage 7:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-static-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:busybox-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:busybox-static-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:busybox-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:busybox-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:busybox-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.34.1-4.9.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.34.1-4.9.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.34.1-4.9.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.34.1-4.9.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.34.1-4.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.34.1-4.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-1.34.1-4.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-1.34.1-4.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:busybox-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:busybox-1.34.1-4.9.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:busybox-1.34.1-4.9.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-1.34.1-4.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-static-1.34.1-4.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:busybox-1.34.1-4.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:busybox-static-1.34.1-4.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:busybox-1.34.1-4.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:busybox-1.34.1-4.9.1.x86_64",
"SUSE Manager Proxy 4.1:busybox-1.34.1-4.9.1.x86_64",
"SUSE Manager Proxy 4.1:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:busybox-1.34.1-4.9.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Manager Server 4.1:busybox-1.34.1-4.9.1.ppc64le",
"SUSE Manager Server 4.1:busybox-1.34.1-4.9.1.s390x",
"SUSE Manager Server 4.1:busybox-1.34.1-4.9.1.x86_64",
"SUSE Manager Server 4.1:busybox-static-1.34.1-4.9.1.ppc64le",
"SUSE Manager Server 4.1:busybox-static-1.34.1-4.9.1.s390x",
"SUSE Manager Server 4.1:busybox-static-1.34.1-4.9.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2018-1000517",
"url": "https://www.suse.com/security/cve/CVE-2018-1000517"
},
{
"category": "external",
"summary": "SUSE Bug 1099260 for CVE-2018-1000517",
"url": "https://bugzilla.suse.com/1099260"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Enterprise Storage 6:busybox-1.34.1-4.9.1.aarch64",
"SUSE Enterprise Storage 6:busybox-1.34.1-4.9.1.x86_64",
"SUSE Enterprise Storage 6:busybox-static-1.34.1-4.9.1.aarch64",
"SUSE Enterprise Storage 6:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Enterprise Storage 7:busybox-1.34.1-4.9.1.aarch64",
"SUSE Enterprise Storage 7:busybox-1.34.1-4.9.1.x86_64",
"SUSE Enterprise Storage 7:busybox-static-1.34.1-4.9.1.aarch64",
"SUSE Enterprise Storage 7:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-static-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:busybox-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:busybox-static-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:busybox-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:busybox-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:busybox-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.34.1-4.9.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.34.1-4.9.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.34.1-4.9.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.34.1-4.9.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.34.1-4.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.34.1-4.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-1.34.1-4.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-1.34.1-4.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:busybox-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:busybox-1.34.1-4.9.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:busybox-1.34.1-4.9.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-1.34.1-4.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-static-1.34.1-4.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:busybox-1.34.1-4.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:busybox-static-1.34.1-4.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:busybox-1.34.1-4.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:busybox-1.34.1-4.9.1.x86_64",
"SUSE Manager Proxy 4.1:busybox-1.34.1-4.9.1.x86_64",
"SUSE Manager Proxy 4.1:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:busybox-1.34.1-4.9.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Manager Server 4.1:busybox-1.34.1-4.9.1.ppc64le",
"SUSE Manager Server 4.1:busybox-1.34.1-4.9.1.s390x",
"SUSE Manager Server 4.1:busybox-1.34.1-4.9.1.x86_64",
"SUSE Manager Server 4.1:busybox-static-1.34.1-4.9.1.ppc64le",
"SUSE Manager Server 4.1:busybox-static-1.34.1-4.9.1.s390x",
"SUSE Manager Server 4.1:busybox-static-1.34.1-4.9.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.6,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L",
"version": "3.0"
},
"products": [
"SUSE Enterprise Storage 6:busybox-1.34.1-4.9.1.aarch64",
"SUSE Enterprise Storage 6:busybox-1.34.1-4.9.1.x86_64",
"SUSE Enterprise Storage 6:busybox-static-1.34.1-4.9.1.aarch64",
"SUSE Enterprise Storage 6:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Enterprise Storage 7:busybox-1.34.1-4.9.1.aarch64",
"SUSE Enterprise Storage 7:busybox-1.34.1-4.9.1.x86_64",
"SUSE Enterprise Storage 7:busybox-static-1.34.1-4.9.1.aarch64",
"SUSE Enterprise Storage 7:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-static-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:busybox-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:busybox-static-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:busybox-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:busybox-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:busybox-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.34.1-4.9.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.34.1-4.9.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.34.1-4.9.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.34.1-4.9.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.34.1-4.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.34.1-4.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-1.34.1-4.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-1.34.1-4.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:busybox-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:busybox-1.34.1-4.9.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:busybox-1.34.1-4.9.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-1.34.1-4.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-static-1.34.1-4.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:busybox-1.34.1-4.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:busybox-static-1.34.1-4.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:busybox-1.34.1-4.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:busybox-1.34.1-4.9.1.x86_64",
"SUSE Manager Proxy 4.1:busybox-1.34.1-4.9.1.x86_64",
"SUSE Manager Proxy 4.1:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:busybox-1.34.1-4.9.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Manager Server 4.1:busybox-1.34.1-4.9.1.ppc64le",
"SUSE Manager Server 4.1:busybox-1.34.1-4.9.1.s390x",
"SUSE Manager Server 4.1:busybox-1.34.1-4.9.1.x86_64",
"SUSE Manager Server 4.1:busybox-static-1.34.1-4.9.1.ppc64le",
"SUSE Manager Server 4.1:busybox-static-1.34.1-4.9.1.s390x",
"SUSE Manager Server 4.1:busybox-static-1.34.1-4.9.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-01-20T09:05:15Z",
"details": "important"
}
],
"title": "CVE-2018-1000517"
},
{
"cve": "CVE-2018-20679",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2018-20679"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in BusyBox before 1.30.0. An out of bounds read in udhcp components (consumed by the DHCP server, client, and relay) allows a remote attacker to leak sensitive information from the stack by sending a crafted DHCP message. This is related to verification in udhcp_get_option() in networking/udhcp/common.c that 4-byte options are indeed 4 bytes.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Enterprise Storage 6:busybox-1.34.1-4.9.1.aarch64",
"SUSE Enterprise Storage 6:busybox-1.34.1-4.9.1.x86_64",
"SUSE Enterprise Storage 6:busybox-static-1.34.1-4.9.1.aarch64",
"SUSE Enterprise Storage 6:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Enterprise Storage 7:busybox-1.34.1-4.9.1.aarch64",
"SUSE Enterprise Storage 7:busybox-1.34.1-4.9.1.x86_64",
"SUSE Enterprise Storage 7:busybox-static-1.34.1-4.9.1.aarch64",
"SUSE Enterprise Storage 7:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-static-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:busybox-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:busybox-static-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:busybox-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:busybox-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:busybox-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.34.1-4.9.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.34.1-4.9.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.34.1-4.9.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.34.1-4.9.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.34.1-4.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.34.1-4.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-1.34.1-4.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-1.34.1-4.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:busybox-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:busybox-1.34.1-4.9.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:busybox-1.34.1-4.9.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-1.34.1-4.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-static-1.34.1-4.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:busybox-1.34.1-4.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:busybox-static-1.34.1-4.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:busybox-1.34.1-4.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:busybox-1.34.1-4.9.1.x86_64",
"SUSE Manager Proxy 4.1:busybox-1.34.1-4.9.1.x86_64",
"SUSE Manager Proxy 4.1:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:busybox-1.34.1-4.9.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Manager Server 4.1:busybox-1.34.1-4.9.1.ppc64le",
"SUSE Manager Server 4.1:busybox-1.34.1-4.9.1.s390x",
"SUSE Manager Server 4.1:busybox-1.34.1-4.9.1.x86_64",
"SUSE Manager Server 4.1:busybox-static-1.34.1-4.9.1.ppc64le",
"SUSE Manager Server 4.1:busybox-static-1.34.1-4.9.1.s390x",
"SUSE Manager Server 4.1:busybox-static-1.34.1-4.9.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2018-20679",
"url": "https://www.suse.com/security/cve/CVE-2018-20679"
},
{
"category": "external",
"summary": "SUSE Bug 1121426 for CVE-2018-20679",
"url": "https://bugzilla.suse.com/1121426"
},
{
"category": "external",
"summary": "SUSE Bug 1121428 for CVE-2018-20679",
"url": "https://bugzilla.suse.com/1121428"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Enterprise Storage 6:busybox-1.34.1-4.9.1.aarch64",
"SUSE Enterprise Storage 6:busybox-1.34.1-4.9.1.x86_64",
"SUSE Enterprise Storage 6:busybox-static-1.34.1-4.9.1.aarch64",
"SUSE Enterprise Storage 6:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Enterprise Storage 7:busybox-1.34.1-4.9.1.aarch64",
"SUSE Enterprise Storage 7:busybox-1.34.1-4.9.1.x86_64",
"SUSE Enterprise Storage 7:busybox-static-1.34.1-4.9.1.aarch64",
"SUSE Enterprise Storage 7:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-static-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:busybox-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:busybox-static-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:busybox-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:busybox-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:busybox-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.34.1-4.9.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.34.1-4.9.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.34.1-4.9.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.34.1-4.9.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.34.1-4.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.34.1-4.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-1.34.1-4.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-1.34.1-4.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:busybox-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:busybox-1.34.1-4.9.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:busybox-1.34.1-4.9.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-1.34.1-4.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-static-1.34.1-4.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:busybox-1.34.1-4.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:busybox-static-1.34.1-4.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:busybox-1.34.1-4.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:busybox-1.34.1-4.9.1.x86_64",
"SUSE Manager Proxy 4.1:busybox-1.34.1-4.9.1.x86_64",
"SUSE Manager Proxy 4.1:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:busybox-1.34.1-4.9.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Manager Server 4.1:busybox-1.34.1-4.9.1.ppc64le",
"SUSE Manager Server 4.1:busybox-1.34.1-4.9.1.s390x",
"SUSE Manager Server 4.1:busybox-1.34.1-4.9.1.x86_64",
"SUSE Manager Server 4.1:busybox-static-1.34.1-4.9.1.ppc64le",
"SUSE Manager Server 4.1:busybox-static-1.34.1-4.9.1.s390x",
"SUSE Manager Server 4.1:busybox-static-1.34.1-4.9.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
"version": "3.0"
},
"products": [
"SUSE Enterprise Storage 6:busybox-1.34.1-4.9.1.aarch64",
"SUSE Enterprise Storage 6:busybox-1.34.1-4.9.1.x86_64",
"SUSE Enterprise Storage 6:busybox-static-1.34.1-4.9.1.aarch64",
"SUSE Enterprise Storage 6:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Enterprise Storage 7:busybox-1.34.1-4.9.1.aarch64",
"SUSE Enterprise Storage 7:busybox-1.34.1-4.9.1.x86_64",
"SUSE Enterprise Storage 7:busybox-static-1.34.1-4.9.1.aarch64",
"SUSE Enterprise Storage 7:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-static-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:busybox-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:busybox-static-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:busybox-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:busybox-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:busybox-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.34.1-4.9.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.34.1-4.9.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.34.1-4.9.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.34.1-4.9.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.34.1-4.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.34.1-4.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-1.34.1-4.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-1.34.1-4.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:busybox-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:busybox-1.34.1-4.9.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:busybox-1.34.1-4.9.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-1.34.1-4.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-static-1.34.1-4.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:busybox-1.34.1-4.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:busybox-static-1.34.1-4.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:busybox-1.34.1-4.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:busybox-1.34.1-4.9.1.x86_64",
"SUSE Manager Proxy 4.1:busybox-1.34.1-4.9.1.x86_64",
"SUSE Manager Proxy 4.1:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:busybox-1.34.1-4.9.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Manager Server 4.1:busybox-1.34.1-4.9.1.ppc64le",
"SUSE Manager Server 4.1:busybox-1.34.1-4.9.1.s390x",
"SUSE Manager Server 4.1:busybox-1.34.1-4.9.1.x86_64",
"SUSE Manager Server 4.1:busybox-static-1.34.1-4.9.1.ppc64le",
"SUSE Manager Server 4.1:busybox-static-1.34.1-4.9.1.s390x",
"SUSE Manager Server 4.1:busybox-static-1.34.1-4.9.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-01-20T09:05:15Z",
"details": "moderate"
}
],
"title": "CVE-2018-20679"
},
{
"cve": "CVE-2019-5747",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-5747"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in BusyBox through 1.30.0. An out of bounds read in udhcp components (consumed by the DHCP client, server, and/or relay) might allow a remote attacker to leak sensitive information from the stack by sending a crafted DHCP message. This is related to assurance of a 4-byte length when decoding DHCP_SUBNET. NOTE: this issue exists because of an incomplete fix for CVE-2018-20679.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Enterprise Storage 6:busybox-1.34.1-4.9.1.aarch64",
"SUSE Enterprise Storage 6:busybox-1.34.1-4.9.1.x86_64",
"SUSE Enterprise Storage 6:busybox-static-1.34.1-4.9.1.aarch64",
"SUSE Enterprise Storage 6:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Enterprise Storage 7:busybox-1.34.1-4.9.1.aarch64",
"SUSE Enterprise Storage 7:busybox-1.34.1-4.9.1.x86_64",
"SUSE Enterprise Storage 7:busybox-static-1.34.1-4.9.1.aarch64",
"SUSE Enterprise Storage 7:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-static-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:busybox-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:busybox-static-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:busybox-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:busybox-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:busybox-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.34.1-4.9.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.34.1-4.9.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.34.1-4.9.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.34.1-4.9.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.34.1-4.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.34.1-4.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-1.34.1-4.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-1.34.1-4.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:busybox-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:busybox-1.34.1-4.9.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:busybox-1.34.1-4.9.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-1.34.1-4.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-static-1.34.1-4.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:busybox-1.34.1-4.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:busybox-static-1.34.1-4.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:busybox-1.34.1-4.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:busybox-1.34.1-4.9.1.x86_64",
"SUSE Manager Proxy 4.1:busybox-1.34.1-4.9.1.x86_64",
"SUSE Manager Proxy 4.1:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:busybox-1.34.1-4.9.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Manager Server 4.1:busybox-1.34.1-4.9.1.ppc64le",
"SUSE Manager Server 4.1:busybox-1.34.1-4.9.1.s390x",
"SUSE Manager Server 4.1:busybox-1.34.1-4.9.1.x86_64",
"SUSE Manager Server 4.1:busybox-static-1.34.1-4.9.1.ppc64le",
"SUSE Manager Server 4.1:busybox-static-1.34.1-4.9.1.s390x",
"SUSE Manager Server 4.1:busybox-static-1.34.1-4.9.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-5747",
"url": "https://www.suse.com/security/cve/CVE-2019-5747"
},
{
"category": "external",
"summary": "SUSE Bug 1121426 for CVE-2019-5747",
"url": "https://bugzilla.suse.com/1121426"
},
{
"category": "external",
"summary": "SUSE Bug 1121428 for CVE-2019-5747",
"url": "https://bugzilla.suse.com/1121428"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Enterprise Storage 6:busybox-1.34.1-4.9.1.aarch64",
"SUSE Enterprise Storage 6:busybox-1.34.1-4.9.1.x86_64",
"SUSE Enterprise Storage 6:busybox-static-1.34.1-4.9.1.aarch64",
"SUSE Enterprise Storage 6:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Enterprise Storage 7:busybox-1.34.1-4.9.1.aarch64",
"SUSE Enterprise Storage 7:busybox-1.34.1-4.9.1.x86_64",
"SUSE Enterprise Storage 7:busybox-static-1.34.1-4.9.1.aarch64",
"SUSE Enterprise Storage 7:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-static-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:busybox-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:busybox-static-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:busybox-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:busybox-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:busybox-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.34.1-4.9.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.34.1-4.9.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.34.1-4.9.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.34.1-4.9.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.34.1-4.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.34.1-4.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-1.34.1-4.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-1.34.1-4.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:busybox-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:busybox-1.34.1-4.9.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:busybox-1.34.1-4.9.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-1.34.1-4.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-static-1.34.1-4.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:busybox-1.34.1-4.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:busybox-static-1.34.1-4.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:busybox-1.34.1-4.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:busybox-1.34.1-4.9.1.x86_64",
"SUSE Manager Proxy 4.1:busybox-1.34.1-4.9.1.x86_64",
"SUSE Manager Proxy 4.1:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:busybox-1.34.1-4.9.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Manager Server 4.1:busybox-1.34.1-4.9.1.ppc64le",
"SUSE Manager Server 4.1:busybox-1.34.1-4.9.1.s390x",
"SUSE Manager Server 4.1:busybox-1.34.1-4.9.1.x86_64",
"SUSE Manager Server 4.1:busybox-static-1.34.1-4.9.1.ppc64le",
"SUSE Manager Server 4.1:busybox-static-1.34.1-4.9.1.s390x",
"SUSE Manager Server 4.1:busybox-static-1.34.1-4.9.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.5,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N",
"version": "3.1"
},
"products": [
"SUSE Enterprise Storage 6:busybox-1.34.1-4.9.1.aarch64",
"SUSE Enterprise Storage 6:busybox-1.34.1-4.9.1.x86_64",
"SUSE Enterprise Storage 6:busybox-static-1.34.1-4.9.1.aarch64",
"SUSE Enterprise Storage 6:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Enterprise Storage 7:busybox-1.34.1-4.9.1.aarch64",
"SUSE Enterprise Storage 7:busybox-1.34.1-4.9.1.x86_64",
"SUSE Enterprise Storage 7:busybox-static-1.34.1-4.9.1.aarch64",
"SUSE Enterprise Storage 7:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-static-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:busybox-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:busybox-static-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:busybox-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:busybox-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:busybox-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.34.1-4.9.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.34.1-4.9.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.34.1-4.9.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.34.1-4.9.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.34.1-4.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.34.1-4.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-1.34.1-4.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-1.34.1-4.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:busybox-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:busybox-1.34.1-4.9.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:busybox-1.34.1-4.9.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-1.34.1-4.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-static-1.34.1-4.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:busybox-1.34.1-4.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:busybox-static-1.34.1-4.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:busybox-1.34.1-4.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:busybox-1.34.1-4.9.1.x86_64",
"SUSE Manager Proxy 4.1:busybox-1.34.1-4.9.1.x86_64",
"SUSE Manager Proxy 4.1:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:busybox-1.34.1-4.9.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Manager Server 4.1:busybox-1.34.1-4.9.1.ppc64le",
"SUSE Manager Server 4.1:busybox-1.34.1-4.9.1.s390x",
"SUSE Manager Server 4.1:busybox-1.34.1-4.9.1.x86_64",
"SUSE Manager Server 4.1:busybox-static-1.34.1-4.9.1.ppc64le",
"SUSE Manager Server 4.1:busybox-static-1.34.1-4.9.1.s390x",
"SUSE Manager Server 4.1:busybox-static-1.34.1-4.9.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-01-20T09:05:15Z",
"details": "low"
}
],
"title": "CVE-2019-5747"
},
{
"cve": "CVE-2021-28831",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-28831"
}
],
"notes": [
{
"category": "general",
"text": "decompress_gunzip.c in BusyBox through 1.32.1 mishandles the error bit on the huft_build result pointer, with a resultant invalid free or segmentation fault, via malformed gzip data.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Enterprise Storage 6:busybox-1.34.1-4.9.1.aarch64",
"SUSE Enterprise Storage 6:busybox-1.34.1-4.9.1.x86_64",
"SUSE Enterprise Storage 6:busybox-static-1.34.1-4.9.1.aarch64",
"SUSE Enterprise Storage 6:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Enterprise Storage 7:busybox-1.34.1-4.9.1.aarch64",
"SUSE Enterprise Storage 7:busybox-1.34.1-4.9.1.x86_64",
"SUSE Enterprise Storage 7:busybox-static-1.34.1-4.9.1.aarch64",
"SUSE Enterprise Storage 7:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-static-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:busybox-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:busybox-static-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:busybox-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:busybox-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:busybox-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.34.1-4.9.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.34.1-4.9.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.34.1-4.9.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.34.1-4.9.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.34.1-4.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.34.1-4.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-1.34.1-4.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-1.34.1-4.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:busybox-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:busybox-1.34.1-4.9.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:busybox-1.34.1-4.9.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-1.34.1-4.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-static-1.34.1-4.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:busybox-1.34.1-4.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:busybox-static-1.34.1-4.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:busybox-1.34.1-4.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:busybox-1.34.1-4.9.1.x86_64",
"SUSE Manager Proxy 4.1:busybox-1.34.1-4.9.1.x86_64",
"SUSE Manager Proxy 4.1:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:busybox-1.34.1-4.9.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Manager Server 4.1:busybox-1.34.1-4.9.1.ppc64le",
"SUSE Manager Server 4.1:busybox-1.34.1-4.9.1.s390x",
"SUSE Manager Server 4.1:busybox-1.34.1-4.9.1.x86_64",
"SUSE Manager Server 4.1:busybox-static-1.34.1-4.9.1.ppc64le",
"SUSE Manager Server 4.1:busybox-static-1.34.1-4.9.1.s390x",
"SUSE Manager Server 4.1:busybox-static-1.34.1-4.9.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-28831",
"url": "https://www.suse.com/security/cve/CVE-2021-28831"
},
{
"category": "external",
"summary": "SUSE Bug 1184522 for CVE-2021-28831",
"url": "https://bugzilla.suse.com/1184522"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Enterprise Storage 6:busybox-1.34.1-4.9.1.aarch64",
"SUSE Enterprise Storage 6:busybox-1.34.1-4.9.1.x86_64",
"SUSE Enterprise Storage 6:busybox-static-1.34.1-4.9.1.aarch64",
"SUSE Enterprise Storage 6:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Enterprise Storage 7:busybox-1.34.1-4.9.1.aarch64",
"SUSE Enterprise Storage 7:busybox-1.34.1-4.9.1.x86_64",
"SUSE Enterprise Storage 7:busybox-static-1.34.1-4.9.1.aarch64",
"SUSE Enterprise Storage 7:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-static-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:busybox-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:busybox-static-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:busybox-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:busybox-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:busybox-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.34.1-4.9.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.34.1-4.9.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.34.1-4.9.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.34.1-4.9.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.34.1-4.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.34.1-4.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-1.34.1-4.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-1.34.1-4.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:busybox-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:busybox-1.34.1-4.9.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:busybox-1.34.1-4.9.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-1.34.1-4.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-static-1.34.1-4.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:busybox-1.34.1-4.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:busybox-static-1.34.1-4.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:busybox-1.34.1-4.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:busybox-1.34.1-4.9.1.x86_64",
"SUSE Manager Proxy 4.1:busybox-1.34.1-4.9.1.x86_64",
"SUSE Manager Proxy 4.1:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:busybox-1.34.1-4.9.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Manager Server 4.1:busybox-1.34.1-4.9.1.ppc64le",
"SUSE Manager Server 4.1:busybox-1.34.1-4.9.1.s390x",
"SUSE Manager Server 4.1:busybox-1.34.1-4.9.1.x86_64",
"SUSE Manager Server 4.1:busybox-static-1.34.1-4.9.1.ppc64le",
"SUSE Manager Server 4.1:busybox-static-1.34.1-4.9.1.s390x",
"SUSE Manager Server 4.1:busybox-static-1.34.1-4.9.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Enterprise Storage 6:busybox-1.34.1-4.9.1.aarch64",
"SUSE Enterprise Storage 6:busybox-1.34.1-4.9.1.x86_64",
"SUSE Enterprise Storage 6:busybox-static-1.34.1-4.9.1.aarch64",
"SUSE Enterprise Storage 6:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Enterprise Storage 7:busybox-1.34.1-4.9.1.aarch64",
"SUSE Enterprise Storage 7:busybox-1.34.1-4.9.1.x86_64",
"SUSE Enterprise Storage 7:busybox-static-1.34.1-4.9.1.aarch64",
"SUSE Enterprise Storage 7:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-static-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:busybox-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:busybox-static-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:busybox-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:busybox-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:busybox-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.34.1-4.9.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.34.1-4.9.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.34.1-4.9.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.34.1-4.9.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.34.1-4.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.34.1-4.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-1.34.1-4.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-1.34.1-4.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:busybox-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:busybox-1.34.1-4.9.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:busybox-1.34.1-4.9.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-1.34.1-4.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-static-1.34.1-4.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:busybox-1.34.1-4.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:busybox-static-1.34.1-4.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:busybox-1.34.1-4.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:busybox-1.34.1-4.9.1.x86_64",
"SUSE Manager Proxy 4.1:busybox-1.34.1-4.9.1.x86_64",
"SUSE Manager Proxy 4.1:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:busybox-1.34.1-4.9.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Manager Server 4.1:busybox-1.34.1-4.9.1.ppc64le",
"SUSE Manager Server 4.1:busybox-1.34.1-4.9.1.s390x",
"SUSE Manager Server 4.1:busybox-1.34.1-4.9.1.x86_64",
"SUSE Manager Server 4.1:busybox-static-1.34.1-4.9.1.ppc64le",
"SUSE Manager Server 4.1:busybox-static-1.34.1-4.9.1.s390x",
"SUSE Manager Server 4.1:busybox-static-1.34.1-4.9.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-01-20T09:05:15Z",
"details": "important"
}
],
"title": "CVE-2021-28831"
},
{
"cve": "CVE-2021-42373",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-42373"
}
],
"notes": [
{
"category": "general",
"text": "A NULL pointer dereference in Busybox\u0027s man applet leads to denial of service when a section name is supplied but no page argument is given",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Enterprise Storage 6:busybox-1.34.1-4.9.1.aarch64",
"SUSE Enterprise Storage 6:busybox-1.34.1-4.9.1.x86_64",
"SUSE Enterprise Storage 6:busybox-static-1.34.1-4.9.1.aarch64",
"SUSE Enterprise Storage 6:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Enterprise Storage 7:busybox-1.34.1-4.9.1.aarch64",
"SUSE Enterprise Storage 7:busybox-1.34.1-4.9.1.x86_64",
"SUSE Enterprise Storage 7:busybox-static-1.34.1-4.9.1.aarch64",
"SUSE Enterprise Storage 7:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-static-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:busybox-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:busybox-static-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:busybox-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:busybox-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:busybox-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.34.1-4.9.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.34.1-4.9.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.34.1-4.9.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.34.1-4.9.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.34.1-4.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.34.1-4.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-1.34.1-4.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-1.34.1-4.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:busybox-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:busybox-1.34.1-4.9.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:busybox-1.34.1-4.9.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-1.34.1-4.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-static-1.34.1-4.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:busybox-1.34.1-4.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:busybox-static-1.34.1-4.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:busybox-1.34.1-4.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:busybox-1.34.1-4.9.1.x86_64",
"SUSE Manager Proxy 4.1:busybox-1.34.1-4.9.1.x86_64",
"SUSE Manager Proxy 4.1:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:busybox-1.34.1-4.9.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Manager Server 4.1:busybox-1.34.1-4.9.1.ppc64le",
"SUSE Manager Server 4.1:busybox-1.34.1-4.9.1.s390x",
"SUSE Manager Server 4.1:busybox-1.34.1-4.9.1.x86_64",
"SUSE Manager Server 4.1:busybox-static-1.34.1-4.9.1.ppc64le",
"SUSE Manager Server 4.1:busybox-static-1.34.1-4.9.1.s390x",
"SUSE Manager Server 4.1:busybox-static-1.34.1-4.9.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-42373",
"url": "https://www.suse.com/security/cve/CVE-2021-42373"
},
{
"category": "external",
"summary": "SUSE Bug 1192869 for CVE-2021-42373",
"url": "https://bugzilla.suse.com/1192869"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Enterprise Storage 6:busybox-1.34.1-4.9.1.aarch64",
"SUSE Enterprise Storage 6:busybox-1.34.1-4.9.1.x86_64",
"SUSE Enterprise Storage 6:busybox-static-1.34.1-4.9.1.aarch64",
"SUSE Enterprise Storage 6:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Enterprise Storage 7:busybox-1.34.1-4.9.1.aarch64",
"SUSE Enterprise Storage 7:busybox-1.34.1-4.9.1.x86_64",
"SUSE Enterprise Storage 7:busybox-static-1.34.1-4.9.1.aarch64",
"SUSE Enterprise Storage 7:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-static-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:busybox-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:busybox-static-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:busybox-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:busybox-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:busybox-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.34.1-4.9.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.34.1-4.9.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.34.1-4.9.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.34.1-4.9.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.34.1-4.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.34.1-4.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-1.34.1-4.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-1.34.1-4.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:busybox-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:busybox-1.34.1-4.9.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:busybox-1.34.1-4.9.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-1.34.1-4.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-static-1.34.1-4.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:busybox-1.34.1-4.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:busybox-static-1.34.1-4.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:busybox-1.34.1-4.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:busybox-1.34.1-4.9.1.x86_64",
"SUSE Manager Proxy 4.1:busybox-1.34.1-4.9.1.x86_64",
"SUSE Manager Proxy 4.1:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:busybox-1.34.1-4.9.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Manager Server 4.1:busybox-1.34.1-4.9.1.ppc64le",
"SUSE Manager Server 4.1:busybox-1.34.1-4.9.1.s390x",
"SUSE Manager Server 4.1:busybox-1.34.1-4.9.1.x86_64",
"SUSE Manager Server 4.1:busybox-static-1.34.1-4.9.1.ppc64le",
"SUSE Manager Server 4.1:busybox-static-1.34.1-4.9.1.s390x",
"SUSE Manager Server 4.1:busybox-static-1.34.1-4.9.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Enterprise Storage 6:busybox-1.34.1-4.9.1.aarch64",
"SUSE Enterprise Storage 6:busybox-1.34.1-4.9.1.x86_64",
"SUSE Enterprise Storage 6:busybox-static-1.34.1-4.9.1.aarch64",
"SUSE Enterprise Storage 6:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Enterprise Storage 7:busybox-1.34.1-4.9.1.aarch64",
"SUSE Enterprise Storage 7:busybox-1.34.1-4.9.1.x86_64",
"SUSE Enterprise Storage 7:busybox-static-1.34.1-4.9.1.aarch64",
"SUSE Enterprise Storage 7:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-static-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:busybox-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:busybox-static-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:busybox-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:busybox-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:busybox-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.34.1-4.9.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.34.1-4.9.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.34.1-4.9.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.34.1-4.9.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.34.1-4.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.34.1-4.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-1.34.1-4.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-1.34.1-4.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:busybox-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:busybox-1.34.1-4.9.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:busybox-1.34.1-4.9.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-1.34.1-4.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-static-1.34.1-4.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:busybox-1.34.1-4.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:busybox-static-1.34.1-4.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:busybox-1.34.1-4.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:busybox-1.34.1-4.9.1.x86_64",
"SUSE Manager Proxy 4.1:busybox-1.34.1-4.9.1.x86_64",
"SUSE Manager Proxy 4.1:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:busybox-1.34.1-4.9.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Manager Server 4.1:busybox-1.34.1-4.9.1.ppc64le",
"SUSE Manager Server 4.1:busybox-1.34.1-4.9.1.s390x",
"SUSE Manager Server 4.1:busybox-1.34.1-4.9.1.x86_64",
"SUSE Manager Server 4.1:busybox-static-1.34.1-4.9.1.ppc64le",
"SUSE Manager Server 4.1:busybox-static-1.34.1-4.9.1.s390x",
"SUSE Manager Server 4.1:busybox-static-1.34.1-4.9.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-01-20T09:05:15Z",
"details": "moderate"
}
],
"title": "CVE-2021-42373"
},
{
"cve": "CVE-2021-42374",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-42374"
}
],
"notes": [
{
"category": "general",
"text": "An out-of-bounds heap read in Busybox\u0027s unlzma applet leads to information leak and denial of service when crafted LZMA-compressed input is decompressed. This can be triggered by any applet/format that",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Enterprise Storage 6:busybox-1.34.1-4.9.1.aarch64",
"SUSE Enterprise Storage 6:busybox-1.34.1-4.9.1.x86_64",
"SUSE Enterprise Storage 6:busybox-static-1.34.1-4.9.1.aarch64",
"SUSE Enterprise Storage 6:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Enterprise Storage 7:busybox-1.34.1-4.9.1.aarch64",
"SUSE Enterprise Storage 7:busybox-1.34.1-4.9.1.x86_64",
"SUSE Enterprise Storage 7:busybox-static-1.34.1-4.9.1.aarch64",
"SUSE Enterprise Storage 7:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-static-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:busybox-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:busybox-static-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:busybox-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:busybox-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:busybox-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.34.1-4.9.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.34.1-4.9.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.34.1-4.9.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.34.1-4.9.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.34.1-4.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.34.1-4.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-1.34.1-4.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-1.34.1-4.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:busybox-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:busybox-1.34.1-4.9.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:busybox-1.34.1-4.9.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-1.34.1-4.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-static-1.34.1-4.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:busybox-1.34.1-4.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:busybox-static-1.34.1-4.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:busybox-1.34.1-4.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:busybox-1.34.1-4.9.1.x86_64",
"SUSE Manager Proxy 4.1:busybox-1.34.1-4.9.1.x86_64",
"SUSE Manager Proxy 4.1:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:busybox-1.34.1-4.9.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Manager Server 4.1:busybox-1.34.1-4.9.1.ppc64le",
"SUSE Manager Server 4.1:busybox-1.34.1-4.9.1.s390x",
"SUSE Manager Server 4.1:busybox-1.34.1-4.9.1.x86_64",
"SUSE Manager Server 4.1:busybox-static-1.34.1-4.9.1.ppc64le",
"SUSE Manager Server 4.1:busybox-static-1.34.1-4.9.1.s390x",
"SUSE Manager Server 4.1:busybox-static-1.34.1-4.9.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-42374",
"url": "https://www.suse.com/security/cve/CVE-2021-42374"
},
{
"category": "external",
"summary": "SUSE Bug 1192869 for CVE-2021-42374",
"url": "https://bugzilla.suse.com/1192869"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Enterprise Storage 6:busybox-1.34.1-4.9.1.aarch64",
"SUSE Enterprise Storage 6:busybox-1.34.1-4.9.1.x86_64",
"SUSE Enterprise Storage 6:busybox-static-1.34.1-4.9.1.aarch64",
"SUSE Enterprise Storage 6:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Enterprise Storage 7:busybox-1.34.1-4.9.1.aarch64",
"SUSE Enterprise Storage 7:busybox-1.34.1-4.9.1.x86_64",
"SUSE Enterprise Storage 7:busybox-static-1.34.1-4.9.1.aarch64",
"SUSE Enterprise Storage 7:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-static-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:busybox-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:busybox-static-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:busybox-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:busybox-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:busybox-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.34.1-4.9.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.34.1-4.9.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.34.1-4.9.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.34.1-4.9.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.34.1-4.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.34.1-4.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-1.34.1-4.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-1.34.1-4.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:busybox-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:busybox-1.34.1-4.9.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:busybox-1.34.1-4.9.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-1.34.1-4.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-static-1.34.1-4.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:busybox-1.34.1-4.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:busybox-static-1.34.1-4.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:busybox-1.34.1-4.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:busybox-1.34.1-4.9.1.x86_64",
"SUSE Manager Proxy 4.1:busybox-1.34.1-4.9.1.x86_64",
"SUSE Manager Proxy 4.1:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:busybox-1.34.1-4.9.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Manager Server 4.1:busybox-1.34.1-4.9.1.ppc64le",
"SUSE Manager Server 4.1:busybox-1.34.1-4.9.1.s390x",
"SUSE Manager Server 4.1:busybox-1.34.1-4.9.1.x86_64",
"SUSE Manager Server 4.1:busybox-static-1.34.1-4.9.1.ppc64le",
"SUSE Manager Server 4.1:busybox-static-1.34.1-4.9.1.s390x",
"SUSE Manager Server 4.1:busybox-static-1.34.1-4.9.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Enterprise Storage 6:busybox-1.34.1-4.9.1.aarch64",
"SUSE Enterprise Storage 6:busybox-1.34.1-4.9.1.x86_64",
"SUSE Enterprise Storage 6:busybox-static-1.34.1-4.9.1.aarch64",
"SUSE Enterprise Storage 6:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Enterprise Storage 7:busybox-1.34.1-4.9.1.aarch64",
"SUSE Enterprise Storage 7:busybox-1.34.1-4.9.1.x86_64",
"SUSE Enterprise Storage 7:busybox-static-1.34.1-4.9.1.aarch64",
"SUSE Enterprise Storage 7:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-static-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:busybox-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:busybox-static-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:busybox-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:busybox-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:busybox-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.34.1-4.9.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.34.1-4.9.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.34.1-4.9.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.34.1-4.9.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.34.1-4.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.34.1-4.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-1.34.1-4.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-1.34.1-4.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:busybox-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:busybox-1.34.1-4.9.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:busybox-1.34.1-4.9.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-1.34.1-4.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-static-1.34.1-4.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:busybox-1.34.1-4.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:busybox-static-1.34.1-4.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:busybox-1.34.1-4.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:busybox-1.34.1-4.9.1.x86_64",
"SUSE Manager Proxy 4.1:busybox-1.34.1-4.9.1.x86_64",
"SUSE Manager Proxy 4.1:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:busybox-1.34.1-4.9.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Manager Server 4.1:busybox-1.34.1-4.9.1.ppc64le",
"SUSE Manager Server 4.1:busybox-1.34.1-4.9.1.s390x",
"SUSE Manager Server 4.1:busybox-1.34.1-4.9.1.x86_64",
"SUSE Manager Server 4.1:busybox-static-1.34.1-4.9.1.ppc64le",
"SUSE Manager Server 4.1:busybox-static-1.34.1-4.9.1.s390x",
"SUSE Manager Server 4.1:busybox-static-1.34.1-4.9.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-01-20T09:05:15Z",
"details": "moderate"
}
],
"title": "CVE-2021-42374"
},
{
"cve": "CVE-2021-42375",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-42375"
}
],
"notes": [
{
"category": "general",
"text": "An incorrect handling of a special element in Busybox\u0027s ash applet leads to denial of service when processing a crafted shell command, due to the shell mistaking specific characters for reserved characters. This may be used for DoS under rare conditions of filtered command input.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Enterprise Storage 6:busybox-1.34.1-4.9.1.aarch64",
"SUSE Enterprise Storage 6:busybox-1.34.1-4.9.1.x86_64",
"SUSE Enterprise Storage 6:busybox-static-1.34.1-4.9.1.aarch64",
"SUSE Enterprise Storage 6:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Enterprise Storage 7:busybox-1.34.1-4.9.1.aarch64",
"SUSE Enterprise Storage 7:busybox-1.34.1-4.9.1.x86_64",
"SUSE Enterprise Storage 7:busybox-static-1.34.1-4.9.1.aarch64",
"SUSE Enterprise Storage 7:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-static-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:busybox-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:busybox-static-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:busybox-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:busybox-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:busybox-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.34.1-4.9.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.34.1-4.9.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.34.1-4.9.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.34.1-4.9.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.34.1-4.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.34.1-4.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-1.34.1-4.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-1.34.1-4.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:busybox-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:busybox-1.34.1-4.9.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:busybox-1.34.1-4.9.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-1.34.1-4.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-static-1.34.1-4.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:busybox-1.34.1-4.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:busybox-static-1.34.1-4.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:busybox-1.34.1-4.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:busybox-1.34.1-4.9.1.x86_64",
"SUSE Manager Proxy 4.1:busybox-1.34.1-4.9.1.x86_64",
"SUSE Manager Proxy 4.1:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:busybox-1.34.1-4.9.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Manager Server 4.1:busybox-1.34.1-4.9.1.ppc64le",
"SUSE Manager Server 4.1:busybox-1.34.1-4.9.1.s390x",
"SUSE Manager Server 4.1:busybox-1.34.1-4.9.1.x86_64",
"SUSE Manager Server 4.1:busybox-static-1.34.1-4.9.1.ppc64le",
"SUSE Manager Server 4.1:busybox-static-1.34.1-4.9.1.s390x",
"SUSE Manager Server 4.1:busybox-static-1.34.1-4.9.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-42375",
"url": "https://www.suse.com/security/cve/CVE-2021-42375"
},
{
"category": "external",
"summary": "SUSE Bug 1192869 for CVE-2021-42375",
"url": "https://bugzilla.suse.com/1192869"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Enterprise Storage 6:busybox-1.34.1-4.9.1.aarch64",
"SUSE Enterprise Storage 6:busybox-1.34.1-4.9.1.x86_64",
"SUSE Enterprise Storage 6:busybox-static-1.34.1-4.9.1.aarch64",
"SUSE Enterprise Storage 6:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Enterprise Storage 7:busybox-1.34.1-4.9.1.aarch64",
"SUSE Enterprise Storage 7:busybox-1.34.1-4.9.1.x86_64",
"SUSE Enterprise Storage 7:busybox-static-1.34.1-4.9.1.aarch64",
"SUSE Enterprise Storage 7:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-static-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:busybox-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:busybox-static-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:busybox-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:busybox-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:busybox-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.34.1-4.9.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.34.1-4.9.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.34.1-4.9.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.34.1-4.9.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.34.1-4.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.34.1-4.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-1.34.1-4.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-1.34.1-4.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:busybox-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:busybox-1.34.1-4.9.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:busybox-1.34.1-4.9.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-1.34.1-4.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-static-1.34.1-4.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:busybox-1.34.1-4.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:busybox-static-1.34.1-4.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:busybox-1.34.1-4.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:busybox-1.34.1-4.9.1.x86_64",
"SUSE Manager Proxy 4.1:busybox-1.34.1-4.9.1.x86_64",
"SUSE Manager Proxy 4.1:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:busybox-1.34.1-4.9.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Manager Server 4.1:busybox-1.34.1-4.9.1.ppc64le",
"SUSE Manager Server 4.1:busybox-1.34.1-4.9.1.s390x",
"SUSE Manager Server 4.1:busybox-1.34.1-4.9.1.x86_64",
"SUSE Manager Server 4.1:busybox-static-1.34.1-4.9.1.ppc64le",
"SUSE Manager Server 4.1:busybox-static-1.34.1-4.9.1.s390x",
"SUSE Manager Server 4.1:busybox-static-1.34.1-4.9.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.1,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Enterprise Storage 6:busybox-1.34.1-4.9.1.aarch64",
"SUSE Enterprise Storage 6:busybox-1.34.1-4.9.1.x86_64",
"SUSE Enterprise Storage 6:busybox-static-1.34.1-4.9.1.aarch64",
"SUSE Enterprise Storage 6:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Enterprise Storage 7:busybox-1.34.1-4.9.1.aarch64",
"SUSE Enterprise Storage 7:busybox-1.34.1-4.9.1.x86_64",
"SUSE Enterprise Storage 7:busybox-static-1.34.1-4.9.1.aarch64",
"SUSE Enterprise Storage 7:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-static-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:busybox-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:busybox-static-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:busybox-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:busybox-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:busybox-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.34.1-4.9.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.34.1-4.9.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.34.1-4.9.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.34.1-4.9.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.34.1-4.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.34.1-4.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-1.34.1-4.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-1.34.1-4.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:busybox-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:busybox-1.34.1-4.9.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:busybox-1.34.1-4.9.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-1.34.1-4.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-static-1.34.1-4.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:busybox-1.34.1-4.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:busybox-static-1.34.1-4.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:busybox-1.34.1-4.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:busybox-1.34.1-4.9.1.x86_64",
"SUSE Manager Proxy 4.1:busybox-1.34.1-4.9.1.x86_64",
"SUSE Manager Proxy 4.1:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:busybox-1.34.1-4.9.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Manager Server 4.1:busybox-1.34.1-4.9.1.ppc64le",
"SUSE Manager Server 4.1:busybox-1.34.1-4.9.1.s390x",
"SUSE Manager Server 4.1:busybox-1.34.1-4.9.1.x86_64",
"SUSE Manager Server 4.1:busybox-static-1.34.1-4.9.1.ppc64le",
"SUSE Manager Server 4.1:busybox-static-1.34.1-4.9.1.s390x",
"SUSE Manager Server 4.1:busybox-static-1.34.1-4.9.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-01-20T09:05:15Z",
"details": "moderate"
}
],
"title": "CVE-2021-42375"
},
{
"cve": "CVE-2021-42376",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-42376"
}
],
"notes": [
{
"category": "general",
"text": "A NULL pointer dereference in Busybox\u0027s hush applet leads to denial of service when processing a crafted shell command, due to missing validation after a \\x03 delimiter character. This may be used for DoS under very rare conditions of filtered command input.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Enterprise Storage 6:busybox-1.34.1-4.9.1.aarch64",
"SUSE Enterprise Storage 6:busybox-1.34.1-4.9.1.x86_64",
"SUSE Enterprise Storage 6:busybox-static-1.34.1-4.9.1.aarch64",
"SUSE Enterprise Storage 6:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Enterprise Storage 7:busybox-1.34.1-4.9.1.aarch64",
"SUSE Enterprise Storage 7:busybox-1.34.1-4.9.1.x86_64",
"SUSE Enterprise Storage 7:busybox-static-1.34.1-4.9.1.aarch64",
"SUSE Enterprise Storage 7:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-static-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:busybox-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:busybox-static-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:busybox-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:busybox-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:busybox-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.34.1-4.9.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.34.1-4.9.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.34.1-4.9.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.34.1-4.9.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.34.1-4.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.34.1-4.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-1.34.1-4.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-1.34.1-4.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:busybox-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:busybox-1.34.1-4.9.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:busybox-1.34.1-4.9.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-1.34.1-4.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-static-1.34.1-4.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:busybox-1.34.1-4.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:busybox-static-1.34.1-4.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:busybox-1.34.1-4.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:busybox-1.34.1-4.9.1.x86_64",
"SUSE Manager Proxy 4.1:busybox-1.34.1-4.9.1.x86_64",
"SUSE Manager Proxy 4.1:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:busybox-1.34.1-4.9.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Manager Server 4.1:busybox-1.34.1-4.9.1.ppc64le",
"SUSE Manager Server 4.1:busybox-1.34.1-4.9.1.s390x",
"SUSE Manager Server 4.1:busybox-1.34.1-4.9.1.x86_64",
"SUSE Manager Server 4.1:busybox-static-1.34.1-4.9.1.ppc64le",
"SUSE Manager Server 4.1:busybox-static-1.34.1-4.9.1.s390x",
"SUSE Manager Server 4.1:busybox-static-1.34.1-4.9.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-42376",
"url": "https://www.suse.com/security/cve/CVE-2021-42376"
},
{
"category": "external",
"summary": "SUSE Bug 1192869 for CVE-2021-42376",
"url": "https://bugzilla.suse.com/1192869"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Enterprise Storage 6:busybox-1.34.1-4.9.1.aarch64",
"SUSE Enterprise Storage 6:busybox-1.34.1-4.9.1.x86_64",
"SUSE Enterprise Storage 6:busybox-static-1.34.1-4.9.1.aarch64",
"SUSE Enterprise Storage 6:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Enterprise Storage 7:busybox-1.34.1-4.9.1.aarch64",
"SUSE Enterprise Storage 7:busybox-1.34.1-4.9.1.x86_64",
"SUSE Enterprise Storage 7:busybox-static-1.34.1-4.9.1.aarch64",
"SUSE Enterprise Storage 7:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-static-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:busybox-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:busybox-static-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:busybox-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:busybox-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:busybox-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.34.1-4.9.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.34.1-4.9.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.34.1-4.9.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.34.1-4.9.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.34.1-4.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.34.1-4.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-1.34.1-4.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-1.34.1-4.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:busybox-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:busybox-1.34.1-4.9.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:busybox-1.34.1-4.9.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-1.34.1-4.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-static-1.34.1-4.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:busybox-1.34.1-4.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:busybox-static-1.34.1-4.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:busybox-1.34.1-4.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:busybox-1.34.1-4.9.1.x86_64",
"SUSE Manager Proxy 4.1:busybox-1.34.1-4.9.1.x86_64",
"SUSE Manager Proxy 4.1:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:busybox-1.34.1-4.9.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Manager Server 4.1:busybox-1.34.1-4.9.1.ppc64le",
"SUSE Manager Server 4.1:busybox-1.34.1-4.9.1.s390x",
"SUSE Manager Server 4.1:busybox-1.34.1-4.9.1.x86_64",
"SUSE Manager Server 4.1:busybox-static-1.34.1-4.9.1.ppc64le",
"SUSE Manager Server 4.1:busybox-static-1.34.1-4.9.1.s390x",
"SUSE Manager Server 4.1:busybox-static-1.34.1-4.9.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.1,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Enterprise Storage 6:busybox-1.34.1-4.9.1.aarch64",
"SUSE Enterprise Storage 6:busybox-1.34.1-4.9.1.x86_64",
"SUSE Enterprise Storage 6:busybox-static-1.34.1-4.9.1.aarch64",
"SUSE Enterprise Storage 6:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Enterprise Storage 7:busybox-1.34.1-4.9.1.aarch64",
"SUSE Enterprise Storage 7:busybox-1.34.1-4.9.1.x86_64",
"SUSE Enterprise Storage 7:busybox-static-1.34.1-4.9.1.aarch64",
"SUSE Enterprise Storage 7:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-static-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:busybox-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:busybox-static-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:busybox-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:busybox-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:busybox-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.34.1-4.9.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.34.1-4.9.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.34.1-4.9.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.34.1-4.9.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.34.1-4.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.34.1-4.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-1.34.1-4.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-1.34.1-4.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:busybox-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:busybox-1.34.1-4.9.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:busybox-1.34.1-4.9.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-1.34.1-4.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-static-1.34.1-4.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:busybox-1.34.1-4.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:busybox-static-1.34.1-4.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:busybox-1.34.1-4.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:busybox-1.34.1-4.9.1.x86_64",
"SUSE Manager Proxy 4.1:busybox-1.34.1-4.9.1.x86_64",
"SUSE Manager Proxy 4.1:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:busybox-1.34.1-4.9.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Manager Server 4.1:busybox-1.34.1-4.9.1.ppc64le",
"SUSE Manager Server 4.1:busybox-1.34.1-4.9.1.s390x",
"SUSE Manager Server 4.1:busybox-1.34.1-4.9.1.x86_64",
"SUSE Manager Server 4.1:busybox-static-1.34.1-4.9.1.ppc64le",
"SUSE Manager Server 4.1:busybox-static-1.34.1-4.9.1.s390x",
"SUSE Manager Server 4.1:busybox-static-1.34.1-4.9.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-01-20T09:05:15Z",
"details": "moderate"
}
],
"title": "CVE-2021-42376"
},
{
"cve": "CVE-2021-42377",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-42377"
}
],
"notes": [
{
"category": "general",
"text": "An attacker-controlled pointer free in Busybox\u0027s hush applet leads to denial of service and possible code execution when processing a crafted shell command, due to the shell mishandling the \u0026\u0026\u0026 string. This may be used for remote code execution under rare conditions of filtered command input.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Enterprise Storage 6:busybox-1.34.1-4.9.1.aarch64",
"SUSE Enterprise Storage 6:busybox-1.34.1-4.9.1.x86_64",
"SUSE Enterprise Storage 6:busybox-static-1.34.1-4.9.1.aarch64",
"SUSE Enterprise Storage 6:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Enterprise Storage 7:busybox-1.34.1-4.9.1.aarch64",
"SUSE Enterprise Storage 7:busybox-1.34.1-4.9.1.x86_64",
"SUSE Enterprise Storage 7:busybox-static-1.34.1-4.9.1.aarch64",
"SUSE Enterprise Storage 7:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-static-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:busybox-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:busybox-static-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:busybox-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:busybox-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:busybox-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.34.1-4.9.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.34.1-4.9.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.34.1-4.9.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.34.1-4.9.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.34.1-4.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.34.1-4.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-1.34.1-4.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-1.34.1-4.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:busybox-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:busybox-1.34.1-4.9.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:busybox-1.34.1-4.9.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-1.34.1-4.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-static-1.34.1-4.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:busybox-1.34.1-4.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:busybox-static-1.34.1-4.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:busybox-1.34.1-4.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:busybox-1.34.1-4.9.1.x86_64",
"SUSE Manager Proxy 4.1:busybox-1.34.1-4.9.1.x86_64",
"SUSE Manager Proxy 4.1:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:busybox-1.34.1-4.9.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Manager Server 4.1:busybox-1.34.1-4.9.1.ppc64le",
"SUSE Manager Server 4.1:busybox-1.34.1-4.9.1.s390x",
"SUSE Manager Server 4.1:busybox-1.34.1-4.9.1.x86_64",
"SUSE Manager Server 4.1:busybox-static-1.34.1-4.9.1.ppc64le",
"SUSE Manager Server 4.1:busybox-static-1.34.1-4.9.1.s390x",
"SUSE Manager Server 4.1:busybox-static-1.34.1-4.9.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-42377",
"url": "https://www.suse.com/security/cve/CVE-2021-42377"
},
{
"category": "external",
"summary": "SUSE Bug 1192869 for CVE-2021-42377",
"url": "https://bugzilla.suse.com/1192869"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Enterprise Storage 6:busybox-1.34.1-4.9.1.aarch64",
"SUSE Enterprise Storage 6:busybox-1.34.1-4.9.1.x86_64",
"SUSE Enterprise Storage 6:busybox-static-1.34.1-4.9.1.aarch64",
"SUSE Enterprise Storage 6:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Enterprise Storage 7:busybox-1.34.1-4.9.1.aarch64",
"SUSE Enterprise Storage 7:busybox-1.34.1-4.9.1.x86_64",
"SUSE Enterprise Storage 7:busybox-static-1.34.1-4.9.1.aarch64",
"SUSE Enterprise Storage 7:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-static-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:busybox-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:busybox-static-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:busybox-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:busybox-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:busybox-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.34.1-4.9.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.34.1-4.9.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.34.1-4.9.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.34.1-4.9.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.34.1-4.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.34.1-4.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-1.34.1-4.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-1.34.1-4.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:busybox-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:busybox-1.34.1-4.9.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:busybox-1.34.1-4.9.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-1.34.1-4.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-static-1.34.1-4.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:busybox-1.34.1-4.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:busybox-static-1.34.1-4.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:busybox-1.34.1-4.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:busybox-1.34.1-4.9.1.x86_64",
"SUSE Manager Proxy 4.1:busybox-1.34.1-4.9.1.x86_64",
"SUSE Manager Proxy 4.1:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:busybox-1.34.1-4.9.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Manager Server 4.1:busybox-1.34.1-4.9.1.ppc64le",
"SUSE Manager Server 4.1:busybox-1.34.1-4.9.1.s390x",
"SUSE Manager Server 4.1:busybox-1.34.1-4.9.1.x86_64",
"SUSE Manager Server 4.1:busybox-static-1.34.1-4.9.1.ppc64le",
"SUSE Manager Server 4.1:busybox-static-1.34.1-4.9.1.s390x",
"SUSE Manager Server 4.1:busybox-static-1.34.1-4.9.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Enterprise Storage 6:busybox-1.34.1-4.9.1.aarch64",
"SUSE Enterprise Storage 6:busybox-1.34.1-4.9.1.x86_64",
"SUSE Enterprise Storage 6:busybox-static-1.34.1-4.9.1.aarch64",
"SUSE Enterprise Storage 6:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Enterprise Storage 7:busybox-1.34.1-4.9.1.aarch64",
"SUSE Enterprise Storage 7:busybox-1.34.1-4.9.1.x86_64",
"SUSE Enterprise Storage 7:busybox-static-1.34.1-4.9.1.aarch64",
"SUSE Enterprise Storage 7:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-static-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:busybox-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:busybox-static-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:busybox-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:busybox-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:busybox-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.34.1-4.9.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.34.1-4.9.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.34.1-4.9.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.34.1-4.9.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.34.1-4.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.34.1-4.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-1.34.1-4.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-1.34.1-4.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:busybox-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:busybox-1.34.1-4.9.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:busybox-1.34.1-4.9.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-1.34.1-4.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-static-1.34.1-4.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:busybox-1.34.1-4.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:busybox-static-1.34.1-4.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:busybox-1.34.1-4.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:busybox-1.34.1-4.9.1.x86_64",
"SUSE Manager Proxy 4.1:busybox-1.34.1-4.9.1.x86_64",
"SUSE Manager Proxy 4.1:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:busybox-1.34.1-4.9.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Manager Server 4.1:busybox-1.34.1-4.9.1.ppc64le",
"SUSE Manager Server 4.1:busybox-1.34.1-4.9.1.s390x",
"SUSE Manager Server 4.1:busybox-1.34.1-4.9.1.x86_64",
"SUSE Manager Server 4.1:busybox-static-1.34.1-4.9.1.ppc64le",
"SUSE Manager Server 4.1:busybox-static-1.34.1-4.9.1.s390x",
"SUSE Manager Server 4.1:busybox-static-1.34.1-4.9.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-01-20T09:05:15Z",
"details": "moderate"
}
],
"title": "CVE-2021-42377"
},
{
"cve": "CVE-2021-42378",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-42378"
}
],
"notes": [
{
"category": "general",
"text": "A use-after-free in Busybox\u0027s awk applet leads to denial of service and possibly code execution when processing a crafted awk pattern in the getvar_i function",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Enterprise Storage 6:busybox-1.34.1-4.9.1.aarch64",
"SUSE Enterprise Storage 6:busybox-1.34.1-4.9.1.x86_64",
"SUSE Enterprise Storage 6:busybox-static-1.34.1-4.9.1.aarch64",
"SUSE Enterprise Storage 6:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Enterprise Storage 7:busybox-1.34.1-4.9.1.aarch64",
"SUSE Enterprise Storage 7:busybox-1.34.1-4.9.1.x86_64",
"SUSE Enterprise Storage 7:busybox-static-1.34.1-4.9.1.aarch64",
"SUSE Enterprise Storage 7:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-static-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:busybox-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:busybox-static-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:busybox-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:busybox-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:busybox-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.34.1-4.9.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.34.1-4.9.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.34.1-4.9.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.34.1-4.9.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.34.1-4.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.34.1-4.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-1.34.1-4.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-1.34.1-4.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:busybox-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:busybox-1.34.1-4.9.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:busybox-1.34.1-4.9.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-1.34.1-4.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-static-1.34.1-4.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:busybox-1.34.1-4.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:busybox-static-1.34.1-4.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:busybox-1.34.1-4.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:busybox-1.34.1-4.9.1.x86_64",
"SUSE Manager Proxy 4.1:busybox-1.34.1-4.9.1.x86_64",
"SUSE Manager Proxy 4.1:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:busybox-1.34.1-4.9.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Manager Server 4.1:busybox-1.34.1-4.9.1.ppc64le",
"SUSE Manager Server 4.1:busybox-1.34.1-4.9.1.s390x",
"SUSE Manager Server 4.1:busybox-1.34.1-4.9.1.x86_64",
"SUSE Manager Server 4.1:busybox-static-1.34.1-4.9.1.ppc64le",
"SUSE Manager Server 4.1:busybox-static-1.34.1-4.9.1.s390x",
"SUSE Manager Server 4.1:busybox-static-1.34.1-4.9.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-42378",
"url": "https://www.suse.com/security/cve/CVE-2021-42378"
},
{
"category": "external",
"summary": "SUSE Bug 1192869 for CVE-2021-42378",
"url": "https://bugzilla.suse.com/1192869"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Enterprise Storage 6:busybox-1.34.1-4.9.1.aarch64",
"SUSE Enterprise Storage 6:busybox-1.34.1-4.9.1.x86_64",
"SUSE Enterprise Storage 6:busybox-static-1.34.1-4.9.1.aarch64",
"SUSE Enterprise Storage 6:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Enterprise Storage 7:busybox-1.34.1-4.9.1.aarch64",
"SUSE Enterprise Storage 7:busybox-1.34.1-4.9.1.x86_64",
"SUSE Enterprise Storage 7:busybox-static-1.34.1-4.9.1.aarch64",
"SUSE Enterprise Storage 7:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-static-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:busybox-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:busybox-static-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:busybox-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:busybox-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:busybox-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.34.1-4.9.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.34.1-4.9.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.34.1-4.9.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.34.1-4.9.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.34.1-4.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.34.1-4.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-1.34.1-4.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-1.34.1-4.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:busybox-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:busybox-1.34.1-4.9.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:busybox-1.34.1-4.9.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-1.34.1-4.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-static-1.34.1-4.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:busybox-1.34.1-4.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:busybox-static-1.34.1-4.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:busybox-1.34.1-4.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:busybox-1.34.1-4.9.1.x86_64",
"SUSE Manager Proxy 4.1:busybox-1.34.1-4.9.1.x86_64",
"SUSE Manager Proxy 4.1:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:busybox-1.34.1-4.9.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Manager Server 4.1:busybox-1.34.1-4.9.1.ppc64le",
"SUSE Manager Server 4.1:busybox-1.34.1-4.9.1.s390x",
"SUSE Manager Server 4.1:busybox-1.34.1-4.9.1.x86_64",
"SUSE Manager Server 4.1:busybox-static-1.34.1-4.9.1.ppc64le",
"SUSE Manager Server 4.1:busybox-static-1.34.1-4.9.1.s390x",
"SUSE Manager Server 4.1:busybox-static-1.34.1-4.9.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.6,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Enterprise Storage 6:busybox-1.34.1-4.9.1.aarch64",
"SUSE Enterprise Storage 6:busybox-1.34.1-4.9.1.x86_64",
"SUSE Enterprise Storage 6:busybox-static-1.34.1-4.9.1.aarch64",
"SUSE Enterprise Storage 6:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Enterprise Storage 7:busybox-1.34.1-4.9.1.aarch64",
"SUSE Enterprise Storage 7:busybox-1.34.1-4.9.1.x86_64",
"SUSE Enterprise Storage 7:busybox-static-1.34.1-4.9.1.aarch64",
"SUSE Enterprise Storage 7:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-static-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:busybox-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:busybox-static-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:busybox-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:busybox-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:busybox-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.34.1-4.9.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.34.1-4.9.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.34.1-4.9.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.34.1-4.9.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.34.1-4.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.34.1-4.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-1.34.1-4.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-1.34.1-4.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:busybox-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:busybox-1.34.1-4.9.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:busybox-1.34.1-4.9.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-1.34.1-4.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-static-1.34.1-4.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:busybox-1.34.1-4.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:busybox-static-1.34.1-4.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:busybox-1.34.1-4.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:busybox-1.34.1-4.9.1.x86_64",
"SUSE Manager Proxy 4.1:busybox-1.34.1-4.9.1.x86_64",
"SUSE Manager Proxy 4.1:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:busybox-1.34.1-4.9.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Manager Server 4.1:busybox-1.34.1-4.9.1.ppc64le",
"SUSE Manager Server 4.1:busybox-1.34.1-4.9.1.s390x",
"SUSE Manager Server 4.1:busybox-1.34.1-4.9.1.x86_64",
"SUSE Manager Server 4.1:busybox-static-1.34.1-4.9.1.ppc64le",
"SUSE Manager Server 4.1:busybox-static-1.34.1-4.9.1.s390x",
"SUSE Manager Server 4.1:busybox-static-1.34.1-4.9.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-01-20T09:05:15Z",
"details": "moderate"
}
],
"title": "CVE-2021-42378"
},
{
"cve": "CVE-2021-42379",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-42379"
}
],
"notes": [
{
"category": "general",
"text": "A use-after-free in Busybox\u0027s awk applet leads to denial of service and possibly code execution when processing a crafted awk pattern in the next_input_file function",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Enterprise Storage 6:busybox-1.34.1-4.9.1.aarch64",
"SUSE Enterprise Storage 6:busybox-1.34.1-4.9.1.x86_64",
"SUSE Enterprise Storage 6:busybox-static-1.34.1-4.9.1.aarch64",
"SUSE Enterprise Storage 6:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Enterprise Storage 7:busybox-1.34.1-4.9.1.aarch64",
"SUSE Enterprise Storage 7:busybox-1.34.1-4.9.1.x86_64",
"SUSE Enterprise Storage 7:busybox-static-1.34.1-4.9.1.aarch64",
"SUSE Enterprise Storage 7:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-static-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:busybox-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:busybox-static-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:busybox-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:busybox-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:busybox-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.34.1-4.9.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.34.1-4.9.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.34.1-4.9.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.34.1-4.9.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.34.1-4.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.34.1-4.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-1.34.1-4.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-1.34.1-4.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:busybox-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:busybox-1.34.1-4.9.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:busybox-1.34.1-4.9.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-1.34.1-4.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-static-1.34.1-4.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:busybox-1.34.1-4.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:busybox-static-1.34.1-4.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:busybox-1.34.1-4.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:busybox-1.34.1-4.9.1.x86_64",
"SUSE Manager Proxy 4.1:busybox-1.34.1-4.9.1.x86_64",
"SUSE Manager Proxy 4.1:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:busybox-1.34.1-4.9.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Manager Server 4.1:busybox-1.34.1-4.9.1.ppc64le",
"SUSE Manager Server 4.1:busybox-1.34.1-4.9.1.s390x",
"SUSE Manager Server 4.1:busybox-1.34.1-4.9.1.x86_64",
"SUSE Manager Server 4.1:busybox-static-1.34.1-4.9.1.ppc64le",
"SUSE Manager Server 4.1:busybox-static-1.34.1-4.9.1.s390x",
"SUSE Manager Server 4.1:busybox-static-1.34.1-4.9.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-42379",
"url": "https://www.suse.com/security/cve/CVE-2021-42379"
},
{
"category": "external",
"summary": "SUSE Bug 1192869 for CVE-2021-42379",
"url": "https://bugzilla.suse.com/1192869"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Enterprise Storage 6:busybox-1.34.1-4.9.1.aarch64",
"SUSE Enterprise Storage 6:busybox-1.34.1-4.9.1.x86_64",
"SUSE Enterprise Storage 6:busybox-static-1.34.1-4.9.1.aarch64",
"SUSE Enterprise Storage 6:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Enterprise Storage 7:busybox-1.34.1-4.9.1.aarch64",
"SUSE Enterprise Storage 7:busybox-1.34.1-4.9.1.x86_64",
"SUSE Enterprise Storage 7:busybox-static-1.34.1-4.9.1.aarch64",
"SUSE Enterprise Storage 7:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-static-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:busybox-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:busybox-static-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:busybox-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:busybox-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:busybox-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.34.1-4.9.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.34.1-4.9.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.34.1-4.9.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.34.1-4.9.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.34.1-4.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.34.1-4.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-1.34.1-4.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-1.34.1-4.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:busybox-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:busybox-1.34.1-4.9.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:busybox-1.34.1-4.9.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-1.34.1-4.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-static-1.34.1-4.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:busybox-1.34.1-4.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:busybox-static-1.34.1-4.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:busybox-1.34.1-4.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:busybox-1.34.1-4.9.1.x86_64",
"SUSE Manager Proxy 4.1:busybox-1.34.1-4.9.1.x86_64",
"SUSE Manager Proxy 4.1:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:busybox-1.34.1-4.9.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Manager Server 4.1:busybox-1.34.1-4.9.1.ppc64le",
"SUSE Manager Server 4.1:busybox-1.34.1-4.9.1.s390x",
"SUSE Manager Server 4.1:busybox-1.34.1-4.9.1.x86_64",
"SUSE Manager Server 4.1:busybox-static-1.34.1-4.9.1.ppc64le",
"SUSE Manager Server 4.1:busybox-static-1.34.1-4.9.1.s390x",
"SUSE Manager Server 4.1:busybox-static-1.34.1-4.9.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.6,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Enterprise Storage 6:busybox-1.34.1-4.9.1.aarch64",
"SUSE Enterprise Storage 6:busybox-1.34.1-4.9.1.x86_64",
"SUSE Enterprise Storage 6:busybox-static-1.34.1-4.9.1.aarch64",
"SUSE Enterprise Storage 6:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Enterprise Storage 7:busybox-1.34.1-4.9.1.aarch64",
"SUSE Enterprise Storage 7:busybox-1.34.1-4.9.1.x86_64",
"SUSE Enterprise Storage 7:busybox-static-1.34.1-4.9.1.aarch64",
"SUSE Enterprise Storage 7:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-static-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:busybox-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:busybox-static-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:busybox-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:busybox-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:busybox-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.34.1-4.9.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.34.1-4.9.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.34.1-4.9.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.34.1-4.9.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.34.1-4.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.34.1-4.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-1.34.1-4.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-1.34.1-4.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:busybox-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:busybox-1.34.1-4.9.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:busybox-1.34.1-4.9.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-1.34.1-4.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-static-1.34.1-4.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:busybox-1.34.1-4.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:busybox-static-1.34.1-4.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:busybox-1.34.1-4.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:busybox-1.34.1-4.9.1.x86_64",
"SUSE Manager Proxy 4.1:busybox-1.34.1-4.9.1.x86_64",
"SUSE Manager Proxy 4.1:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:busybox-1.34.1-4.9.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Manager Server 4.1:busybox-1.34.1-4.9.1.ppc64le",
"SUSE Manager Server 4.1:busybox-1.34.1-4.9.1.s390x",
"SUSE Manager Server 4.1:busybox-1.34.1-4.9.1.x86_64",
"SUSE Manager Server 4.1:busybox-static-1.34.1-4.9.1.ppc64le",
"SUSE Manager Server 4.1:busybox-static-1.34.1-4.9.1.s390x",
"SUSE Manager Server 4.1:busybox-static-1.34.1-4.9.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-01-20T09:05:15Z",
"details": "moderate"
}
],
"title": "CVE-2021-42379"
},
{
"cve": "CVE-2021-42380",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-42380"
}
],
"notes": [
{
"category": "general",
"text": "A use-after-free in Busybox\u0027s awk applet leads to denial of service and possibly code execution when processing a crafted awk pattern in the clrvar function",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Enterprise Storage 6:busybox-1.34.1-4.9.1.aarch64",
"SUSE Enterprise Storage 6:busybox-1.34.1-4.9.1.x86_64",
"SUSE Enterprise Storage 6:busybox-static-1.34.1-4.9.1.aarch64",
"SUSE Enterprise Storage 6:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Enterprise Storage 7:busybox-1.34.1-4.9.1.aarch64",
"SUSE Enterprise Storage 7:busybox-1.34.1-4.9.1.x86_64",
"SUSE Enterprise Storage 7:busybox-static-1.34.1-4.9.1.aarch64",
"SUSE Enterprise Storage 7:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-static-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:busybox-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:busybox-static-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:busybox-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:busybox-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:busybox-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.34.1-4.9.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.34.1-4.9.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.34.1-4.9.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.34.1-4.9.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.34.1-4.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.34.1-4.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-1.34.1-4.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-1.34.1-4.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:busybox-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:busybox-1.34.1-4.9.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:busybox-1.34.1-4.9.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-1.34.1-4.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-static-1.34.1-4.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:busybox-1.34.1-4.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:busybox-static-1.34.1-4.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:busybox-1.34.1-4.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:busybox-1.34.1-4.9.1.x86_64",
"SUSE Manager Proxy 4.1:busybox-1.34.1-4.9.1.x86_64",
"SUSE Manager Proxy 4.1:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:busybox-1.34.1-4.9.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Manager Server 4.1:busybox-1.34.1-4.9.1.ppc64le",
"SUSE Manager Server 4.1:busybox-1.34.1-4.9.1.s390x",
"SUSE Manager Server 4.1:busybox-1.34.1-4.9.1.x86_64",
"SUSE Manager Server 4.1:busybox-static-1.34.1-4.9.1.ppc64le",
"SUSE Manager Server 4.1:busybox-static-1.34.1-4.9.1.s390x",
"SUSE Manager Server 4.1:busybox-static-1.34.1-4.9.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-42380",
"url": "https://www.suse.com/security/cve/CVE-2021-42380"
},
{
"category": "external",
"summary": "SUSE Bug 1192869 for CVE-2021-42380",
"url": "https://bugzilla.suse.com/1192869"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Enterprise Storage 6:busybox-1.34.1-4.9.1.aarch64",
"SUSE Enterprise Storage 6:busybox-1.34.1-4.9.1.x86_64",
"SUSE Enterprise Storage 6:busybox-static-1.34.1-4.9.1.aarch64",
"SUSE Enterprise Storage 6:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Enterprise Storage 7:busybox-1.34.1-4.9.1.aarch64",
"SUSE Enterprise Storage 7:busybox-1.34.1-4.9.1.x86_64",
"SUSE Enterprise Storage 7:busybox-static-1.34.1-4.9.1.aarch64",
"SUSE Enterprise Storage 7:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-static-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:busybox-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:busybox-static-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:busybox-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:busybox-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:busybox-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.34.1-4.9.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.34.1-4.9.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.34.1-4.9.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.34.1-4.9.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.34.1-4.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.34.1-4.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-1.34.1-4.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-1.34.1-4.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:busybox-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:busybox-1.34.1-4.9.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:busybox-1.34.1-4.9.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-1.34.1-4.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-static-1.34.1-4.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:busybox-1.34.1-4.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:busybox-static-1.34.1-4.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:busybox-1.34.1-4.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:busybox-1.34.1-4.9.1.x86_64",
"SUSE Manager Proxy 4.1:busybox-1.34.1-4.9.1.x86_64",
"SUSE Manager Proxy 4.1:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:busybox-1.34.1-4.9.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Manager Server 4.1:busybox-1.34.1-4.9.1.ppc64le",
"SUSE Manager Server 4.1:busybox-1.34.1-4.9.1.s390x",
"SUSE Manager Server 4.1:busybox-1.34.1-4.9.1.x86_64",
"SUSE Manager Server 4.1:busybox-static-1.34.1-4.9.1.ppc64le",
"SUSE Manager Server 4.1:busybox-static-1.34.1-4.9.1.s390x",
"SUSE Manager Server 4.1:busybox-static-1.34.1-4.9.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.6,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Enterprise Storage 6:busybox-1.34.1-4.9.1.aarch64",
"SUSE Enterprise Storage 6:busybox-1.34.1-4.9.1.x86_64",
"SUSE Enterprise Storage 6:busybox-static-1.34.1-4.9.1.aarch64",
"SUSE Enterprise Storage 6:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Enterprise Storage 7:busybox-1.34.1-4.9.1.aarch64",
"SUSE Enterprise Storage 7:busybox-1.34.1-4.9.1.x86_64",
"SUSE Enterprise Storage 7:busybox-static-1.34.1-4.9.1.aarch64",
"SUSE Enterprise Storage 7:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-static-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:busybox-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:busybox-static-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:busybox-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:busybox-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:busybox-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.34.1-4.9.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.34.1-4.9.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.34.1-4.9.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.34.1-4.9.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.34.1-4.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.34.1-4.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-1.34.1-4.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-1.34.1-4.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:busybox-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:busybox-1.34.1-4.9.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:busybox-1.34.1-4.9.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-1.34.1-4.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-static-1.34.1-4.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:busybox-1.34.1-4.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:busybox-static-1.34.1-4.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:busybox-1.34.1-4.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:busybox-1.34.1-4.9.1.x86_64",
"SUSE Manager Proxy 4.1:busybox-1.34.1-4.9.1.x86_64",
"SUSE Manager Proxy 4.1:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:busybox-1.34.1-4.9.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Manager Server 4.1:busybox-1.34.1-4.9.1.ppc64le",
"SUSE Manager Server 4.1:busybox-1.34.1-4.9.1.s390x",
"SUSE Manager Server 4.1:busybox-1.34.1-4.9.1.x86_64",
"SUSE Manager Server 4.1:busybox-static-1.34.1-4.9.1.ppc64le",
"SUSE Manager Server 4.1:busybox-static-1.34.1-4.9.1.s390x",
"SUSE Manager Server 4.1:busybox-static-1.34.1-4.9.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-01-20T09:05:15Z",
"details": "moderate"
}
],
"title": "CVE-2021-42380"
},
{
"cve": "CVE-2021-42381",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-42381"
}
],
"notes": [
{
"category": "general",
"text": "A use-after-free in Busybox\u0027s awk applet leads to denial of service and possibly code execution when processing a crafted awk pattern in the hash_init function",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Enterprise Storage 6:busybox-1.34.1-4.9.1.aarch64",
"SUSE Enterprise Storage 6:busybox-1.34.1-4.9.1.x86_64",
"SUSE Enterprise Storage 6:busybox-static-1.34.1-4.9.1.aarch64",
"SUSE Enterprise Storage 6:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Enterprise Storage 7:busybox-1.34.1-4.9.1.aarch64",
"SUSE Enterprise Storage 7:busybox-1.34.1-4.9.1.x86_64",
"SUSE Enterprise Storage 7:busybox-static-1.34.1-4.9.1.aarch64",
"SUSE Enterprise Storage 7:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-static-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:busybox-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:busybox-static-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:busybox-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:busybox-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:busybox-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.34.1-4.9.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.34.1-4.9.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.34.1-4.9.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.34.1-4.9.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.34.1-4.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.34.1-4.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-1.34.1-4.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-1.34.1-4.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:busybox-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:busybox-1.34.1-4.9.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:busybox-1.34.1-4.9.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-1.34.1-4.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-static-1.34.1-4.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:busybox-1.34.1-4.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:busybox-static-1.34.1-4.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:busybox-1.34.1-4.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:busybox-1.34.1-4.9.1.x86_64",
"SUSE Manager Proxy 4.1:busybox-1.34.1-4.9.1.x86_64",
"SUSE Manager Proxy 4.1:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:busybox-1.34.1-4.9.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Manager Server 4.1:busybox-1.34.1-4.9.1.ppc64le",
"SUSE Manager Server 4.1:busybox-1.34.1-4.9.1.s390x",
"SUSE Manager Server 4.1:busybox-1.34.1-4.9.1.x86_64",
"SUSE Manager Server 4.1:busybox-static-1.34.1-4.9.1.ppc64le",
"SUSE Manager Server 4.1:busybox-static-1.34.1-4.9.1.s390x",
"SUSE Manager Server 4.1:busybox-static-1.34.1-4.9.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-42381",
"url": "https://www.suse.com/security/cve/CVE-2021-42381"
},
{
"category": "external",
"summary": "SUSE Bug 1192869 for CVE-2021-42381",
"url": "https://bugzilla.suse.com/1192869"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Enterprise Storage 6:busybox-1.34.1-4.9.1.aarch64",
"SUSE Enterprise Storage 6:busybox-1.34.1-4.9.1.x86_64",
"SUSE Enterprise Storage 6:busybox-static-1.34.1-4.9.1.aarch64",
"SUSE Enterprise Storage 6:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Enterprise Storage 7:busybox-1.34.1-4.9.1.aarch64",
"SUSE Enterprise Storage 7:busybox-1.34.1-4.9.1.x86_64",
"SUSE Enterprise Storage 7:busybox-static-1.34.1-4.9.1.aarch64",
"SUSE Enterprise Storage 7:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-static-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:busybox-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:busybox-static-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:busybox-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:busybox-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:busybox-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.34.1-4.9.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.34.1-4.9.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.34.1-4.9.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.34.1-4.9.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.34.1-4.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.34.1-4.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-1.34.1-4.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-1.34.1-4.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:busybox-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:busybox-1.34.1-4.9.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:busybox-1.34.1-4.9.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-1.34.1-4.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-static-1.34.1-4.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:busybox-1.34.1-4.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:busybox-static-1.34.1-4.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:busybox-1.34.1-4.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:busybox-1.34.1-4.9.1.x86_64",
"SUSE Manager Proxy 4.1:busybox-1.34.1-4.9.1.x86_64",
"SUSE Manager Proxy 4.1:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:busybox-1.34.1-4.9.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Manager Server 4.1:busybox-1.34.1-4.9.1.ppc64le",
"SUSE Manager Server 4.1:busybox-1.34.1-4.9.1.s390x",
"SUSE Manager Server 4.1:busybox-1.34.1-4.9.1.x86_64",
"SUSE Manager Server 4.1:busybox-static-1.34.1-4.9.1.ppc64le",
"SUSE Manager Server 4.1:busybox-static-1.34.1-4.9.1.s390x",
"SUSE Manager Server 4.1:busybox-static-1.34.1-4.9.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.6,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Enterprise Storage 6:busybox-1.34.1-4.9.1.aarch64",
"SUSE Enterprise Storage 6:busybox-1.34.1-4.9.1.x86_64",
"SUSE Enterprise Storage 6:busybox-static-1.34.1-4.9.1.aarch64",
"SUSE Enterprise Storage 6:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Enterprise Storage 7:busybox-1.34.1-4.9.1.aarch64",
"SUSE Enterprise Storage 7:busybox-1.34.1-4.9.1.x86_64",
"SUSE Enterprise Storage 7:busybox-static-1.34.1-4.9.1.aarch64",
"SUSE Enterprise Storage 7:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-static-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:busybox-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:busybox-static-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:busybox-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:busybox-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:busybox-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.34.1-4.9.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.34.1-4.9.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.34.1-4.9.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.34.1-4.9.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.34.1-4.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.34.1-4.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-1.34.1-4.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-1.34.1-4.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:busybox-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:busybox-1.34.1-4.9.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:busybox-1.34.1-4.9.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-1.34.1-4.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-static-1.34.1-4.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:busybox-1.34.1-4.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:busybox-static-1.34.1-4.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:busybox-1.34.1-4.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:busybox-1.34.1-4.9.1.x86_64",
"SUSE Manager Proxy 4.1:busybox-1.34.1-4.9.1.x86_64",
"SUSE Manager Proxy 4.1:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:busybox-1.34.1-4.9.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Manager Server 4.1:busybox-1.34.1-4.9.1.ppc64le",
"SUSE Manager Server 4.1:busybox-1.34.1-4.9.1.s390x",
"SUSE Manager Server 4.1:busybox-1.34.1-4.9.1.x86_64",
"SUSE Manager Server 4.1:busybox-static-1.34.1-4.9.1.ppc64le",
"SUSE Manager Server 4.1:busybox-static-1.34.1-4.9.1.s390x",
"SUSE Manager Server 4.1:busybox-static-1.34.1-4.9.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-01-20T09:05:15Z",
"details": "moderate"
}
],
"title": "CVE-2021-42381"
},
{
"cve": "CVE-2021-42382",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-42382"
}
],
"notes": [
{
"category": "general",
"text": "A use-after-free in Busybox\u0027s awk applet leads to denial of service and possibly code execution when processing a crafted awk pattern in the getvar_s function",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Enterprise Storage 6:busybox-1.34.1-4.9.1.aarch64",
"SUSE Enterprise Storage 6:busybox-1.34.1-4.9.1.x86_64",
"SUSE Enterprise Storage 6:busybox-static-1.34.1-4.9.1.aarch64",
"SUSE Enterprise Storage 6:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Enterprise Storage 7:busybox-1.34.1-4.9.1.aarch64",
"SUSE Enterprise Storage 7:busybox-1.34.1-4.9.1.x86_64",
"SUSE Enterprise Storage 7:busybox-static-1.34.1-4.9.1.aarch64",
"SUSE Enterprise Storage 7:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-static-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:busybox-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:busybox-static-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:busybox-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:busybox-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:busybox-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.34.1-4.9.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.34.1-4.9.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.34.1-4.9.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.34.1-4.9.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.34.1-4.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.34.1-4.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-1.34.1-4.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-1.34.1-4.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:busybox-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:busybox-1.34.1-4.9.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:busybox-1.34.1-4.9.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-1.34.1-4.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-static-1.34.1-4.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:busybox-1.34.1-4.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:busybox-static-1.34.1-4.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:busybox-1.34.1-4.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:busybox-1.34.1-4.9.1.x86_64",
"SUSE Manager Proxy 4.1:busybox-1.34.1-4.9.1.x86_64",
"SUSE Manager Proxy 4.1:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:busybox-1.34.1-4.9.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Manager Server 4.1:busybox-1.34.1-4.9.1.ppc64le",
"SUSE Manager Server 4.1:busybox-1.34.1-4.9.1.s390x",
"SUSE Manager Server 4.1:busybox-1.34.1-4.9.1.x86_64",
"SUSE Manager Server 4.1:busybox-static-1.34.1-4.9.1.ppc64le",
"SUSE Manager Server 4.1:busybox-static-1.34.1-4.9.1.s390x",
"SUSE Manager Server 4.1:busybox-static-1.34.1-4.9.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-42382",
"url": "https://www.suse.com/security/cve/CVE-2021-42382"
},
{
"category": "external",
"summary": "SUSE Bug 1192869 for CVE-2021-42382",
"url": "https://bugzilla.suse.com/1192869"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Enterprise Storage 6:busybox-1.34.1-4.9.1.aarch64",
"SUSE Enterprise Storage 6:busybox-1.34.1-4.9.1.x86_64",
"SUSE Enterprise Storage 6:busybox-static-1.34.1-4.9.1.aarch64",
"SUSE Enterprise Storage 6:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Enterprise Storage 7:busybox-1.34.1-4.9.1.aarch64",
"SUSE Enterprise Storage 7:busybox-1.34.1-4.9.1.x86_64",
"SUSE Enterprise Storage 7:busybox-static-1.34.1-4.9.1.aarch64",
"SUSE Enterprise Storage 7:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-static-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:busybox-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:busybox-static-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:busybox-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:busybox-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:busybox-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.34.1-4.9.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.34.1-4.9.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.34.1-4.9.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.34.1-4.9.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.34.1-4.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.34.1-4.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-1.34.1-4.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-1.34.1-4.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:busybox-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:busybox-1.34.1-4.9.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:busybox-1.34.1-4.9.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-1.34.1-4.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-static-1.34.1-4.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:busybox-1.34.1-4.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:busybox-static-1.34.1-4.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:busybox-1.34.1-4.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:busybox-1.34.1-4.9.1.x86_64",
"SUSE Manager Proxy 4.1:busybox-1.34.1-4.9.1.x86_64",
"SUSE Manager Proxy 4.1:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:busybox-1.34.1-4.9.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Manager Server 4.1:busybox-1.34.1-4.9.1.ppc64le",
"SUSE Manager Server 4.1:busybox-1.34.1-4.9.1.s390x",
"SUSE Manager Server 4.1:busybox-1.34.1-4.9.1.x86_64",
"SUSE Manager Server 4.1:busybox-static-1.34.1-4.9.1.ppc64le",
"SUSE Manager Server 4.1:busybox-static-1.34.1-4.9.1.s390x",
"SUSE Manager Server 4.1:busybox-static-1.34.1-4.9.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.6,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Enterprise Storage 6:busybox-1.34.1-4.9.1.aarch64",
"SUSE Enterprise Storage 6:busybox-1.34.1-4.9.1.x86_64",
"SUSE Enterprise Storage 6:busybox-static-1.34.1-4.9.1.aarch64",
"SUSE Enterprise Storage 6:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Enterprise Storage 7:busybox-1.34.1-4.9.1.aarch64",
"SUSE Enterprise Storage 7:busybox-1.34.1-4.9.1.x86_64",
"SUSE Enterprise Storage 7:busybox-static-1.34.1-4.9.1.aarch64",
"SUSE Enterprise Storage 7:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-static-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:busybox-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:busybox-static-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:busybox-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:busybox-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:busybox-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.34.1-4.9.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.34.1-4.9.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.34.1-4.9.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.34.1-4.9.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.34.1-4.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.34.1-4.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-1.34.1-4.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-1.34.1-4.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:busybox-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:busybox-1.34.1-4.9.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:busybox-1.34.1-4.9.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-1.34.1-4.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-static-1.34.1-4.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:busybox-1.34.1-4.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:busybox-static-1.34.1-4.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:busybox-1.34.1-4.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:busybox-1.34.1-4.9.1.x86_64",
"SUSE Manager Proxy 4.1:busybox-1.34.1-4.9.1.x86_64",
"SUSE Manager Proxy 4.1:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:busybox-1.34.1-4.9.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Manager Server 4.1:busybox-1.34.1-4.9.1.ppc64le",
"SUSE Manager Server 4.1:busybox-1.34.1-4.9.1.s390x",
"SUSE Manager Server 4.1:busybox-1.34.1-4.9.1.x86_64",
"SUSE Manager Server 4.1:busybox-static-1.34.1-4.9.1.ppc64le",
"SUSE Manager Server 4.1:busybox-static-1.34.1-4.9.1.s390x",
"SUSE Manager Server 4.1:busybox-static-1.34.1-4.9.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-01-20T09:05:15Z",
"details": "moderate"
}
],
"title": "CVE-2021-42382"
},
{
"cve": "CVE-2021-42383",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-42383"
}
],
"notes": [
{
"category": "general",
"text": "A use-after-free in Busybox\u0027s awk applet leads to denial of service and possibly code execution when processing a crafted awk pattern in the evaluate function",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Enterprise Storage 6:busybox-1.34.1-4.9.1.aarch64",
"SUSE Enterprise Storage 6:busybox-1.34.1-4.9.1.x86_64",
"SUSE Enterprise Storage 6:busybox-static-1.34.1-4.9.1.aarch64",
"SUSE Enterprise Storage 6:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Enterprise Storage 7:busybox-1.34.1-4.9.1.aarch64",
"SUSE Enterprise Storage 7:busybox-1.34.1-4.9.1.x86_64",
"SUSE Enterprise Storage 7:busybox-static-1.34.1-4.9.1.aarch64",
"SUSE Enterprise Storage 7:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-static-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:busybox-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:busybox-static-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:busybox-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:busybox-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:busybox-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.34.1-4.9.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.34.1-4.9.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.34.1-4.9.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.34.1-4.9.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.34.1-4.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.34.1-4.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-1.34.1-4.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-1.34.1-4.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:busybox-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:busybox-1.34.1-4.9.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:busybox-1.34.1-4.9.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-1.34.1-4.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-static-1.34.1-4.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:busybox-1.34.1-4.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:busybox-static-1.34.1-4.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:busybox-1.34.1-4.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:busybox-1.34.1-4.9.1.x86_64",
"SUSE Manager Proxy 4.1:busybox-1.34.1-4.9.1.x86_64",
"SUSE Manager Proxy 4.1:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:busybox-1.34.1-4.9.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Manager Server 4.1:busybox-1.34.1-4.9.1.ppc64le",
"SUSE Manager Server 4.1:busybox-1.34.1-4.9.1.s390x",
"SUSE Manager Server 4.1:busybox-1.34.1-4.9.1.x86_64",
"SUSE Manager Server 4.1:busybox-static-1.34.1-4.9.1.ppc64le",
"SUSE Manager Server 4.1:busybox-static-1.34.1-4.9.1.s390x",
"SUSE Manager Server 4.1:busybox-static-1.34.1-4.9.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-42383",
"url": "https://www.suse.com/security/cve/CVE-2021-42383"
},
{
"category": "external",
"summary": "SUSE Bug 1192869 for CVE-2021-42383",
"url": "https://bugzilla.suse.com/1192869"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Enterprise Storage 6:busybox-1.34.1-4.9.1.aarch64",
"SUSE Enterprise Storage 6:busybox-1.34.1-4.9.1.x86_64",
"SUSE Enterprise Storage 6:busybox-static-1.34.1-4.9.1.aarch64",
"SUSE Enterprise Storage 6:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Enterprise Storage 7:busybox-1.34.1-4.9.1.aarch64",
"SUSE Enterprise Storage 7:busybox-1.34.1-4.9.1.x86_64",
"SUSE Enterprise Storage 7:busybox-static-1.34.1-4.9.1.aarch64",
"SUSE Enterprise Storage 7:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-static-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:busybox-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:busybox-static-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:busybox-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:busybox-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:busybox-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.34.1-4.9.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.34.1-4.9.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.34.1-4.9.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.34.1-4.9.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.34.1-4.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.34.1-4.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-1.34.1-4.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-1.34.1-4.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:busybox-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:busybox-1.34.1-4.9.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:busybox-1.34.1-4.9.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-1.34.1-4.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-static-1.34.1-4.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:busybox-1.34.1-4.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:busybox-static-1.34.1-4.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:busybox-1.34.1-4.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:busybox-1.34.1-4.9.1.x86_64",
"SUSE Manager Proxy 4.1:busybox-1.34.1-4.9.1.x86_64",
"SUSE Manager Proxy 4.1:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:busybox-1.34.1-4.9.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Manager Server 4.1:busybox-1.34.1-4.9.1.ppc64le",
"SUSE Manager Server 4.1:busybox-1.34.1-4.9.1.s390x",
"SUSE Manager Server 4.1:busybox-1.34.1-4.9.1.x86_64",
"SUSE Manager Server 4.1:busybox-static-1.34.1-4.9.1.ppc64le",
"SUSE Manager Server 4.1:busybox-static-1.34.1-4.9.1.s390x",
"SUSE Manager Server 4.1:busybox-static-1.34.1-4.9.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.6,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Enterprise Storage 6:busybox-1.34.1-4.9.1.aarch64",
"SUSE Enterprise Storage 6:busybox-1.34.1-4.9.1.x86_64",
"SUSE Enterprise Storage 6:busybox-static-1.34.1-4.9.1.aarch64",
"SUSE Enterprise Storage 6:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Enterprise Storage 7:busybox-1.34.1-4.9.1.aarch64",
"SUSE Enterprise Storage 7:busybox-1.34.1-4.9.1.x86_64",
"SUSE Enterprise Storage 7:busybox-static-1.34.1-4.9.1.aarch64",
"SUSE Enterprise Storage 7:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-static-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:busybox-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:busybox-static-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:busybox-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:busybox-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:busybox-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.34.1-4.9.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.34.1-4.9.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.34.1-4.9.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.34.1-4.9.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.34.1-4.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.34.1-4.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-1.34.1-4.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-1.34.1-4.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:busybox-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:busybox-1.34.1-4.9.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:busybox-1.34.1-4.9.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-1.34.1-4.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-static-1.34.1-4.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:busybox-1.34.1-4.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:busybox-static-1.34.1-4.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:busybox-1.34.1-4.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:busybox-1.34.1-4.9.1.x86_64",
"SUSE Manager Proxy 4.1:busybox-1.34.1-4.9.1.x86_64",
"SUSE Manager Proxy 4.1:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:busybox-1.34.1-4.9.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Manager Server 4.1:busybox-1.34.1-4.9.1.ppc64le",
"SUSE Manager Server 4.1:busybox-1.34.1-4.9.1.s390x",
"SUSE Manager Server 4.1:busybox-1.34.1-4.9.1.x86_64",
"SUSE Manager Server 4.1:busybox-static-1.34.1-4.9.1.ppc64le",
"SUSE Manager Server 4.1:busybox-static-1.34.1-4.9.1.s390x",
"SUSE Manager Server 4.1:busybox-static-1.34.1-4.9.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-01-20T09:05:15Z",
"details": "moderate"
}
],
"title": "CVE-2021-42383"
},
{
"cve": "CVE-2021-42384",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-42384"
}
],
"notes": [
{
"category": "general",
"text": "A use-after-free in Busybox\u0027s awk applet leads to denial of service and possibly code execution when processing a crafted awk pattern in the handle_special function",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Enterprise Storage 6:busybox-1.34.1-4.9.1.aarch64",
"SUSE Enterprise Storage 6:busybox-1.34.1-4.9.1.x86_64",
"SUSE Enterprise Storage 6:busybox-static-1.34.1-4.9.1.aarch64",
"SUSE Enterprise Storage 6:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Enterprise Storage 7:busybox-1.34.1-4.9.1.aarch64",
"SUSE Enterprise Storage 7:busybox-1.34.1-4.9.1.x86_64",
"SUSE Enterprise Storage 7:busybox-static-1.34.1-4.9.1.aarch64",
"SUSE Enterprise Storage 7:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-static-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:busybox-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:busybox-static-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:busybox-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:busybox-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:busybox-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.34.1-4.9.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.34.1-4.9.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.34.1-4.9.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.34.1-4.9.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.34.1-4.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.34.1-4.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-1.34.1-4.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-1.34.1-4.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:busybox-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:busybox-1.34.1-4.9.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:busybox-1.34.1-4.9.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-1.34.1-4.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-static-1.34.1-4.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:busybox-1.34.1-4.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:busybox-static-1.34.1-4.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:busybox-1.34.1-4.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:busybox-1.34.1-4.9.1.x86_64",
"SUSE Manager Proxy 4.1:busybox-1.34.1-4.9.1.x86_64",
"SUSE Manager Proxy 4.1:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:busybox-1.34.1-4.9.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Manager Server 4.1:busybox-1.34.1-4.9.1.ppc64le",
"SUSE Manager Server 4.1:busybox-1.34.1-4.9.1.s390x",
"SUSE Manager Server 4.1:busybox-1.34.1-4.9.1.x86_64",
"SUSE Manager Server 4.1:busybox-static-1.34.1-4.9.1.ppc64le",
"SUSE Manager Server 4.1:busybox-static-1.34.1-4.9.1.s390x",
"SUSE Manager Server 4.1:busybox-static-1.34.1-4.9.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-42384",
"url": "https://www.suse.com/security/cve/CVE-2021-42384"
},
{
"category": "external",
"summary": "SUSE Bug 1192869 for CVE-2021-42384",
"url": "https://bugzilla.suse.com/1192869"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Enterprise Storage 6:busybox-1.34.1-4.9.1.aarch64",
"SUSE Enterprise Storage 6:busybox-1.34.1-4.9.1.x86_64",
"SUSE Enterprise Storage 6:busybox-static-1.34.1-4.9.1.aarch64",
"SUSE Enterprise Storage 6:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Enterprise Storage 7:busybox-1.34.1-4.9.1.aarch64",
"SUSE Enterprise Storage 7:busybox-1.34.1-4.9.1.x86_64",
"SUSE Enterprise Storage 7:busybox-static-1.34.1-4.9.1.aarch64",
"SUSE Enterprise Storage 7:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-static-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:busybox-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:busybox-static-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:busybox-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:busybox-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:busybox-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.34.1-4.9.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.34.1-4.9.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.34.1-4.9.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.34.1-4.9.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.34.1-4.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.34.1-4.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-1.34.1-4.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-1.34.1-4.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:busybox-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:busybox-1.34.1-4.9.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:busybox-1.34.1-4.9.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-1.34.1-4.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-static-1.34.1-4.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:busybox-1.34.1-4.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:busybox-static-1.34.1-4.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:busybox-1.34.1-4.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:busybox-1.34.1-4.9.1.x86_64",
"SUSE Manager Proxy 4.1:busybox-1.34.1-4.9.1.x86_64",
"SUSE Manager Proxy 4.1:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:busybox-1.34.1-4.9.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Manager Server 4.1:busybox-1.34.1-4.9.1.ppc64le",
"SUSE Manager Server 4.1:busybox-1.34.1-4.9.1.s390x",
"SUSE Manager Server 4.1:busybox-1.34.1-4.9.1.x86_64",
"SUSE Manager Server 4.1:busybox-static-1.34.1-4.9.1.ppc64le",
"SUSE Manager Server 4.1:busybox-static-1.34.1-4.9.1.s390x",
"SUSE Manager Server 4.1:busybox-static-1.34.1-4.9.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.6,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Enterprise Storage 6:busybox-1.34.1-4.9.1.aarch64",
"SUSE Enterprise Storage 6:busybox-1.34.1-4.9.1.x86_64",
"SUSE Enterprise Storage 6:busybox-static-1.34.1-4.9.1.aarch64",
"SUSE Enterprise Storage 6:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Enterprise Storage 7:busybox-1.34.1-4.9.1.aarch64",
"SUSE Enterprise Storage 7:busybox-1.34.1-4.9.1.x86_64",
"SUSE Enterprise Storage 7:busybox-static-1.34.1-4.9.1.aarch64",
"SUSE Enterprise Storage 7:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-static-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:busybox-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:busybox-static-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:busybox-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:busybox-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:busybox-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.34.1-4.9.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.34.1-4.9.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.34.1-4.9.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.34.1-4.9.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.34.1-4.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.34.1-4.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-1.34.1-4.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-1.34.1-4.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:busybox-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:busybox-1.34.1-4.9.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:busybox-1.34.1-4.9.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-1.34.1-4.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-static-1.34.1-4.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:busybox-1.34.1-4.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:busybox-static-1.34.1-4.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:busybox-1.34.1-4.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:busybox-1.34.1-4.9.1.x86_64",
"SUSE Manager Proxy 4.1:busybox-1.34.1-4.9.1.x86_64",
"SUSE Manager Proxy 4.1:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:busybox-1.34.1-4.9.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Manager Server 4.1:busybox-1.34.1-4.9.1.ppc64le",
"SUSE Manager Server 4.1:busybox-1.34.1-4.9.1.s390x",
"SUSE Manager Server 4.1:busybox-1.34.1-4.9.1.x86_64",
"SUSE Manager Server 4.1:busybox-static-1.34.1-4.9.1.ppc64le",
"SUSE Manager Server 4.1:busybox-static-1.34.1-4.9.1.s390x",
"SUSE Manager Server 4.1:busybox-static-1.34.1-4.9.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-01-20T09:05:15Z",
"details": "moderate"
}
],
"title": "CVE-2021-42384"
},
{
"cve": "CVE-2021-42385",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-42385"
}
],
"notes": [
{
"category": "general",
"text": "A use-after-free in Busybox\u0027s awk applet leads to denial of service and possibly code execution when processing a crafted awk pattern in the evaluate function",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Enterprise Storage 6:busybox-1.34.1-4.9.1.aarch64",
"SUSE Enterprise Storage 6:busybox-1.34.1-4.9.1.x86_64",
"SUSE Enterprise Storage 6:busybox-static-1.34.1-4.9.1.aarch64",
"SUSE Enterprise Storage 6:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Enterprise Storage 7:busybox-1.34.1-4.9.1.aarch64",
"SUSE Enterprise Storage 7:busybox-1.34.1-4.9.1.x86_64",
"SUSE Enterprise Storage 7:busybox-static-1.34.1-4.9.1.aarch64",
"SUSE Enterprise Storage 7:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-static-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:busybox-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:busybox-static-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:busybox-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:busybox-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:busybox-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.34.1-4.9.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.34.1-4.9.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.34.1-4.9.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.34.1-4.9.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.34.1-4.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.34.1-4.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-1.34.1-4.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-1.34.1-4.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:busybox-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:busybox-1.34.1-4.9.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:busybox-1.34.1-4.9.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-1.34.1-4.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-static-1.34.1-4.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:busybox-1.34.1-4.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:busybox-static-1.34.1-4.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:busybox-1.34.1-4.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:busybox-1.34.1-4.9.1.x86_64",
"SUSE Manager Proxy 4.1:busybox-1.34.1-4.9.1.x86_64",
"SUSE Manager Proxy 4.1:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:busybox-1.34.1-4.9.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Manager Server 4.1:busybox-1.34.1-4.9.1.ppc64le",
"SUSE Manager Server 4.1:busybox-1.34.1-4.9.1.s390x",
"SUSE Manager Server 4.1:busybox-1.34.1-4.9.1.x86_64",
"SUSE Manager Server 4.1:busybox-static-1.34.1-4.9.1.ppc64le",
"SUSE Manager Server 4.1:busybox-static-1.34.1-4.9.1.s390x",
"SUSE Manager Server 4.1:busybox-static-1.34.1-4.9.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-42385",
"url": "https://www.suse.com/security/cve/CVE-2021-42385"
},
{
"category": "external",
"summary": "SUSE Bug 1192869 for CVE-2021-42385",
"url": "https://bugzilla.suse.com/1192869"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Enterprise Storage 6:busybox-1.34.1-4.9.1.aarch64",
"SUSE Enterprise Storage 6:busybox-1.34.1-4.9.1.x86_64",
"SUSE Enterprise Storage 6:busybox-static-1.34.1-4.9.1.aarch64",
"SUSE Enterprise Storage 6:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Enterprise Storage 7:busybox-1.34.1-4.9.1.aarch64",
"SUSE Enterprise Storage 7:busybox-1.34.1-4.9.1.x86_64",
"SUSE Enterprise Storage 7:busybox-static-1.34.1-4.9.1.aarch64",
"SUSE Enterprise Storage 7:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-static-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:busybox-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:busybox-static-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:busybox-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:busybox-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:busybox-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.34.1-4.9.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.34.1-4.9.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.34.1-4.9.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.34.1-4.9.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.34.1-4.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.34.1-4.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-1.34.1-4.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-1.34.1-4.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:busybox-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:busybox-1.34.1-4.9.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:busybox-1.34.1-4.9.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-1.34.1-4.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-static-1.34.1-4.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:busybox-1.34.1-4.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:busybox-static-1.34.1-4.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:busybox-1.34.1-4.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:busybox-1.34.1-4.9.1.x86_64",
"SUSE Manager Proxy 4.1:busybox-1.34.1-4.9.1.x86_64",
"SUSE Manager Proxy 4.1:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:busybox-1.34.1-4.9.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Manager Server 4.1:busybox-1.34.1-4.9.1.ppc64le",
"SUSE Manager Server 4.1:busybox-1.34.1-4.9.1.s390x",
"SUSE Manager Server 4.1:busybox-1.34.1-4.9.1.x86_64",
"SUSE Manager Server 4.1:busybox-static-1.34.1-4.9.1.ppc64le",
"SUSE Manager Server 4.1:busybox-static-1.34.1-4.9.1.s390x",
"SUSE Manager Server 4.1:busybox-static-1.34.1-4.9.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.6,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Enterprise Storage 6:busybox-1.34.1-4.9.1.aarch64",
"SUSE Enterprise Storage 6:busybox-1.34.1-4.9.1.x86_64",
"SUSE Enterprise Storage 6:busybox-static-1.34.1-4.9.1.aarch64",
"SUSE Enterprise Storage 6:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Enterprise Storage 7:busybox-1.34.1-4.9.1.aarch64",
"SUSE Enterprise Storage 7:busybox-1.34.1-4.9.1.x86_64",
"SUSE Enterprise Storage 7:busybox-static-1.34.1-4.9.1.aarch64",
"SUSE Enterprise Storage 7:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-static-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:busybox-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:busybox-static-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:busybox-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:busybox-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:busybox-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.34.1-4.9.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.34.1-4.9.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.34.1-4.9.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.34.1-4.9.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.34.1-4.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.34.1-4.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-1.34.1-4.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-1.34.1-4.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:busybox-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:busybox-1.34.1-4.9.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:busybox-1.34.1-4.9.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-1.34.1-4.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-static-1.34.1-4.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:busybox-1.34.1-4.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:busybox-static-1.34.1-4.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:busybox-1.34.1-4.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:busybox-1.34.1-4.9.1.x86_64",
"SUSE Manager Proxy 4.1:busybox-1.34.1-4.9.1.x86_64",
"SUSE Manager Proxy 4.1:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:busybox-1.34.1-4.9.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Manager Server 4.1:busybox-1.34.1-4.9.1.ppc64le",
"SUSE Manager Server 4.1:busybox-1.34.1-4.9.1.s390x",
"SUSE Manager Server 4.1:busybox-1.34.1-4.9.1.x86_64",
"SUSE Manager Server 4.1:busybox-static-1.34.1-4.9.1.ppc64le",
"SUSE Manager Server 4.1:busybox-static-1.34.1-4.9.1.s390x",
"SUSE Manager Server 4.1:busybox-static-1.34.1-4.9.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-01-20T09:05:15Z",
"details": "moderate"
}
],
"title": "CVE-2021-42385"
},
{
"cve": "CVE-2021-42386",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-42386"
}
],
"notes": [
{
"category": "general",
"text": "A use-after-free in Busybox\u0027s awk applet leads to denial of service and possibly code execution when processing a crafted awk pattern in the nvalloc function",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Enterprise Storage 6:busybox-1.34.1-4.9.1.aarch64",
"SUSE Enterprise Storage 6:busybox-1.34.1-4.9.1.x86_64",
"SUSE Enterprise Storage 6:busybox-static-1.34.1-4.9.1.aarch64",
"SUSE Enterprise Storage 6:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Enterprise Storage 7:busybox-1.34.1-4.9.1.aarch64",
"SUSE Enterprise Storage 7:busybox-1.34.1-4.9.1.x86_64",
"SUSE Enterprise Storage 7:busybox-static-1.34.1-4.9.1.aarch64",
"SUSE Enterprise Storage 7:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-static-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:busybox-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:busybox-static-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:busybox-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:busybox-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:busybox-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.34.1-4.9.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.34.1-4.9.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.34.1-4.9.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.34.1-4.9.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.34.1-4.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.34.1-4.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-1.34.1-4.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-1.34.1-4.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:busybox-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:busybox-1.34.1-4.9.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:busybox-1.34.1-4.9.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-1.34.1-4.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-static-1.34.1-4.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:busybox-1.34.1-4.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:busybox-static-1.34.1-4.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:busybox-1.34.1-4.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:busybox-1.34.1-4.9.1.x86_64",
"SUSE Manager Proxy 4.1:busybox-1.34.1-4.9.1.x86_64",
"SUSE Manager Proxy 4.1:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:busybox-1.34.1-4.9.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Manager Server 4.1:busybox-1.34.1-4.9.1.ppc64le",
"SUSE Manager Server 4.1:busybox-1.34.1-4.9.1.s390x",
"SUSE Manager Server 4.1:busybox-1.34.1-4.9.1.x86_64",
"SUSE Manager Server 4.1:busybox-static-1.34.1-4.9.1.ppc64le",
"SUSE Manager Server 4.1:busybox-static-1.34.1-4.9.1.s390x",
"SUSE Manager Server 4.1:busybox-static-1.34.1-4.9.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-42386",
"url": "https://www.suse.com/security/cve/CVE-2021-42386"
},
{
"category": "external",
"summary": "SUSE Bug 1192869 for CVE-2021-42386",
"url": "https://bugzilla.suse.com/1192869"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Enterprise Storage 6:busybox-1.34.1-4.9.1.aarch64",
"SUSE Enterprise Storage 6:busybox-1.34.1-4.9.1.x86_64",
"SUSE Enterprise Storage 6:busybox-static-1.34.1-4.9.1.aarch64",
"SUSE Enterprise Storage 6:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Enterprise Storage 7:busybox-1.34.1-4.9.1.aarch64",
"SUSE Enterprise Storage 7:busybox-1.34.1-4.9.1.x86_64",
"SUSE Enterprise Storage 7:busybox-static-1.34.1-4.9.1.aarch64",
"SUSE Enterprise Storage 7:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-static-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:busybox-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:busybox-static-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:busybox-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:busybox-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:busybox-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.34.1-4.9.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.34.1-4.9.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.34.1-4.9.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.34.1-4.9.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.34.1-4.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.34.1-4.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-1.34.1-4.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-1.34.1-4.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:busybox-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:busybox-1.34.1-4.9.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:busybox-1.34.1-4.9.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-1.34.1-4.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-static-1.34.1-4.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:busybox-1.34.1-4.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:busybox-static-1.34.1-4.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:busybox-1.34.1-4.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:busybox-1.34.1-4.9.1.x86_64",
"SUSE Manager Proxy 4.1:busybox-1.34.1-4.9.1.x86_64",
"SUSE Manager Proxy 4.1:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:busybox-1.34.1-4.9.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Manager Server 4.1:busybox-1.34.1-4.9.1.ppc64le",
"SUSE Manager Server 4.1:busybox-1.34.1-4.9.1.s390x",
"SUSE Manager Server 4.1:busybox-1.34.1-4.9.1.x86_64",
"SUSE Manager Server 4.1:busybox-static-1.34.1-4.9.1.ppc64le",
"SUSE Manager Server 4.1:busybox-static-1.34.1-4.9.1.s390x",
"SUSE Manager Server 4.1:busybox-static-1.34.1-4.9.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.6,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Enterprise Storage 6:busybox-1.34.1-4.9.1.aarch64",
"SUSE Enterprise Storage 6:busybox-1.34.1-4.9.1.x86_64",
"SUSE Enterprise Storage 6:busybox-static-1.34.1-4.9.1.aarch64",
"SUSE Enterprise Storage 6:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Enterprise Storage 7:busybox-1.34.1-4.9.1.aarch64",
"SUSE Enterprise Storage 7:busybox-1.34.1-4.9.1.x86_64",
"SUSE Enterprise Storage 7:busybox-static-1.34.1-4.9.1.aarch64",
"SUSE Enterprise Storage 7:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-static-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:busybox-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:busybox-static-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:busybox-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:busybox-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:busybox-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.34.1-4.9.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.34.1-4.9.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.34.1-4.9.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.34.1-4.9.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.34.1-4.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.34.1-4.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-1.34.1-4.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-1.34.1-4.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:busybox-1.34.1-4.9.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:busybox-1.34.1-4.9.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:busybox-1.34.1-4.9.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-1.34.1-4.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-static-1.34.1-4.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:busybox-1.34.1-4.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:busybox-static-1.34.1-4.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:busybox-1.34.1-4.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:busybox-1.34.1-4.9.1.x86_64",
"SUSE Manager Proxy 4.1:busybox-1.34.1-4.9.1.x86_64",
"SUSE Manager Proxy 4.1:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:busybox-1.34.1-4.9.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:busybox-static-1.34.1-4.9.1.x86_64",
"SUSE Manager Server 4.1:busybox-1.34.1-4.9.1.ppc64le",
"SUSE Manager Server 4.1:busybox-1.34.1-4.9.1.s390x",
"SUSE Manager Server 4.1:busybox-1.34.1-4.9.1.x86_64",
"SUSE Manager Server 4.1:busybox-static-1.34.1-4.9.1.ppc64le",
"SUSE Manager Server 4.1:busybox-static-1.34.1-4.9.1.s390x",
"SUSE Manager Server 4.1:busybox-static-1.34.1-4.9.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-01-20T09:05:15Z",
"details": "moderate"
}
],
"title": "CVE-2021-42386"
}
]
}
SUSE-SU-2022:4253-1
Vulnerability from csaf_suse - Published: 2022-11-28 10:23 - Updated: 2022-11-28 10:23Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for busybox",
"title": "Title of the patch"
},
{
"category": "description",
"text": "This update for busybox fixes the following issues:\n\n- CVE-2014-9645: Fixed loading of unwanted modules with / (bsc#914660).\n- CVE-2017-16544: Fixed insufficient sanitization of filenames when autocompleting (bsc#1069412).\n- CVE-2015-9261: Fixed huft_build misuses a pointer, causing segfaults (bsc#1102912).\n- CVE-2016-2147: Fixed out of bounds write (heap) due to integer underflow in udhcpc (bsc#970663).\n- CVE-2016-2148: Fixed heap-based buffer overflow in OPTION_6RD parsing (bsc#970662).\n- CVE-2016-6301: Fixed NTP server denial of service flaw (bsc#991940).\n- CVE-2017-15873: Fixed integer overflow in get_next_block function in archival/libarchive/decompress_bunzip2.c (bsc#1064976).\n- CVE-2017-15874: Fixed integer overflow in archival/libarchive/decompress_unlzma (bsc#1064978).\n- CVE-2019-5747: Fixed out of bounds read in udhcp components (bsc#1121428).\n- CVE-2021-42373, CVE-2021-42374, CVE-2021-42375, CVE-2021-42376, CVE-2021-42377, CVE-2021-42378, CVE-2021-42379, CVE-2021-42380, CVE-2021-42381, CVE-2021-42382, CVE-2021-42383, CVE-2021-42384, CVE-2021-42385, CVE-2021-42386: v1.34.0 bugfixes (bsc#1192869).\n- CVE-2021-28831: Fixed invalid free or segmentation fault via malformed gzip data (bsc#1184522).\n- CVE-2018-20679: Fixed out of bounds read in udhcp (bsc#1121426).\n- CVE-2018-1000517: Fixed heap-based buffer overflow in the retrieve_file_data() (bsc#1099260).\n- CVE-2011-5325: Fixed tar directory traversal (bsc#951562).\n- CVE-2018-1000500: Fixed missing SSL certificate validation in wget (bsc#1099263).\n \n- Update to 1.35.0\n - awk: fix printf %%, fix read beyond end of buffer\n - chrt: silence analyzer warning\n - libarchive: remove duplicate forward declaration\n - mount: \u0027mount -o rw ....\u0027 should not fall back to RO mount\n - ps: fix -o pid=PID,args interpreting entire \u0027PID,args\u0027 as header\n - tar: prevent malicious archives with long name sizes causing OOM\n - udhcpc6: fix udhcp_find_option to actually find DHCP6 options\n - xxd: fix -p -r\n - support for new optoins added to basename, cpio, date, find, \n mktemp, wget and others\n\n- Enable fdisk (jsc#CAR-16)\n\n- Update to 1.34.1:\n * build system: use SOURCE_DATE_EPOCH for timestamp if available\n * many bug fixes and new features\n * touch: make FEATURE_TOUCH_NODEREF unconditional\n \n- update to 1.33.1:\n * httpd: fix sendfile\n * ash: fix HISTFILE corruptio\n * ash: fix unset variable pattern expansion\n * traceroute: fix option parsing\n * gunzip: fix for archive corruption\n\n- Update to version 1.33.0\n - many bug fixes and new features\n\n- Update to version 1.32.1\n - fixes a case where in ash, \u0027wait\u0027 never finishes. \n\n- prepare usrmerge (bsc#1029961)\n\n- Enable testsuite and package it for later rerun (for QA, jsc#CAR-15)\n\n- Update to version 1.31.1:\n + Bug fix release. 1.30.1 has fixes for dc, ash (PS1 expansion\n fix), hush, dpkg-deb, telnet and wget.\n- Changes from version 1.31.0:\n + many bugfixes and new features.\n- Add busybox-no-stime.patch: stime() has been deprecated in glibc\n 2.31 and replaced with clock_settime().\n\n- update to 1.25.1:\n * fixes for hush, gunzip, ip route, ntpd\n- includes changes from 1.25.0:\n * many added and expanded implementations of command options\n- includes changes from 1.24.2:\n * fixes for build system (static build with glibc fixed),\n truncate, gunzip and unzip. \n\n- Update to version 1.24.1\n * for a full list of changes see http://www.busybox.net/news.html\n- Refresh busybox.install.patch \n\n- Update to 1.23.2\n * for a full list of changes see http://www.busybox.net/news.html\n- Cleaned up spec file with spec-cleaner\n- Refreshed patches\n\n- update to 1.22.1:\n Many updates and fixes for most included tools, see\n see http://www.busybox.net/news.html\n",
"title": "Description of the patch"
},
{
"category": "details",
"text": "SUSE-2022-4253,SUSE-OpenStack-Cloud-9-2022-4253,SUSE-OpenStack-Cloud-Crowbar-9-2022-4253,SUSE-SLE-SAP-12-SP4-2022-4253,SUSE-SLE-SERVER-12-SP2-BCL-2022-4253,SUSE-SLE-SERVER-12-SP3-BCL-2022-4253,SUSE-SLE-SERVER-12-SP4-LTSS-2022-4253,SUSE-SLE-SERVER-12-SP5-2022-4253",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2022_4253-1.json"
},
{
"category": "self",
"summary": "URL for SUSE-SU-2022:4253-1",
"url": "https://www.suse.com/support/update/announcement/2022/suse-su-20224253-1/"
},
{
"category": "self",
"summary": "E-Mail link for SUSE-SU-2022:4253-1",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2022-November/013126.html"
},
{
"category": "self",
"summary": "SUSE Bug 1029961",
"url": "https://bugzilla.suse.com/1029961"
},
{
"category": "self",
"summary": "SUSE Bug 1064976",
"url": "https://bugzilla.suse.com/1064976"
},
{
"category": "self",
"summary": "SUSE Bug 1064978",
"url": "https://bugzilla.suse.com/1064978"
},
{
"category": "self",
"summary": "SUSE Bug 1069412",
"url": "https://bugzilla.suse.com/1069412"
},
{
"category": "self",
"summary": "SUSE Bug 1099260",
"url": "https://bugzilla.suse.com/1099260"
},
{
"category": "self",
"summary": "SUSE Bug 1099263",
"url": "https://bugzilla.suse.com/1099263"
},
{
"category": "self",
"summary": "SUSE Bug 1102912",
"url": "https://bugzilla.suse.com/1102912"
},
{
"category": "self",
"summary": "SUSE Bug 1121426",
"url": "https://bugzilla.suse.com/1121426"
},
{
"category": "self",
"summary": "SUSE Bug 1121428",
"url": "https://bugzilla.suse.com/1121428"
},
{
"category": "self",
"summary": "SUSE Bug 1184522",
"url": "https://bugzilla.suse.com/1184522"
},
{
"category": "self",
"summary": "SUSE Bug 1191514",
"url": "https://bugzilla.suse.com/1191514"
},
{
"category": "self",
"summary": "SUSE Bug 1192869",
"url": "https://bugzilla.suse.com/1192869"
},
{
"category": "self",
"summary": "SUSE Bug 914660",
"url": "https://bugzilla.suse.com/914660"
},
{
"category": "self",
"summary": "SUSE Bug 951562",
"url": "https://bugzilla.suse.com/951562"
},
{
"category": "self",
"summary": "SUSE Bug 970662",
"url": "https://bugzilla.suse.com/970662"
},
{
"category": "self",
"summary": "SUSE Bug 970663",
"url": "https://bugzilla.suse.com/970663"
},
{
"category": "self",
"summary": "SUSE Bug 991940",
"url": "https://bugzilla.suse.com/991940"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2011-5325 page",
"url": "https://www.suse.com/security/cve/CVE-2011-5325/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2014-9645 page",
"url": "https://www.suse.com/security/cve/CVE-2014-9645/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2015-9261 page",
"url": "https://www.suse.com/security/cve/CVE-2015-9261/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2016-2147 page",
"url": "https://www.suse.com/security/cve/CVE-2016-2147/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2016-2148 page",
"url": "https://www.suse.com/security/cve/CVE-2016-2148/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2016-6301 page",
"url": "https://www.suse.com/security/cve/CVE-2016-6301/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-15873 page",
"url": "https://www.suse.com/security/cve/CVE-2017-15873/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-15874 page",
"url": "https://www.suse.com/security/cve/CVE-2017-15874/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-16544 page",
"url": "https://www.suse.com/security/cve/CVE-2017-16544/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2018-1000500 page",
"url": "https://www.suse.com/security/cve/CVE-2018-1000500/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2018-1000517 page",
"url": "https://www.suse.com/security/cve/CVE-2018-1000517/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2018-20679 page",
"url": "https://www.suse.com/security/cve/CVE-2018-20679/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-5747 page",
"url": "https://www.suse.com/security/cve/CVE-2019-5747/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-28831 page",
"url": "https://www.suse.com/security/cve/CVE-2021-28831/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-42373 page",
"url": "https://www.suse.com/security/cve/CVE-2021-42373/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-42374 page",
"url": "https://www.suse.com/security/cve/CVE-2021-42374/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-42375 page",
"url": "https://www.suse.com/security/cve/CVE-2021-42375/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-42376 page",
"url": "https://www.suse.com/security/cve/CVE-2021-42376/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-42377 page",
"url": "https://www.suse.com/security/cve/CVE-2021-42377/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-42378 page",
"url": "https://www.suse.com/security/cve/CVE-2021-42378/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-42379 page",
"url": "https://www.suse.com/security/cve/CVE-2021-42379/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-42380 page",
"url": "https://www.suse.com/security/cve/CVE-2021-42380/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-42381 page",
"url": "https://www.suse.com/security/cve/CVE-2021-42381/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-42382 page",
"url": "https://www.suse.com/security/cve/CVE-2021-42382/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-42383 page",
"url": "https://www.suse.com/security/cve/CVE-2021-42383/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-42384 page",
"url": "https://www.suse.com/security/cve/CVE-2021-42384/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-42385 page",
"url": "https://www.suse.com/security/cve/CVE-2021-42385/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-42386 page",
"url": "https://www.suse.com/security/cve/CVE-2021-42386/"
}
],
"title": "Security update for busybox",
"tracking": {
"current_release_date": "2022-11-28T10:23:47Z",
"generator": {
"date": "2022-11-28T10:23:47Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "SUSE-SU-2022:4253-1",
"initial_release_date": "2022-11-28T10:23:47Z",
"revision_history": [
{
"date": "2022-11-28T10:23:47Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "busybox-1.35.0-4.3.1.aarch64",
"product": {
"name": "busybox-1.35.0-4.3.1.aarch64",
"product_id": "busybox-1.35.0-4.3.1.aarch64"
}
},
{
"category": "product_version",
"name": "busybox-static-1.35.0-4.3.1.aarch64",
"product": {
"name": "busybox-static-1.35.0-4.3.1.aarch64",
"product_id": "busybox-static-1.35.0-4.3.1.aarch64"
}
},
{
"category": "product_version",
"name": "busybox-testsuite-1.35.0-4.3.1.aarch64",
"product": {
"name": "busybox-testsuite-1.35.0-4.3.1.aarch64",
"product_id": "busybox-testsuite-1.35.0-4.3.1.aarch64"
}
},
{
"category": "product_version",
"name": "busybox-warewulf3-1.35.0-4.3.1.aarch64",
"product": {
"name": "busybox-warewulf3-1.35.0-4.3.1.aarch64",
"product_id": "busybox-warewulf3-1.35.0-4.3.1.aarch64"
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "busybox-1.35.0-4.3.1.i586",
"product": {
"name": "busybox-1.35.0-4.3.1.i586",
"product_id": "busybox-1.35.0-4.3.1.i586"
}
},
{
"category": "product_version",
"name": "busybox-static-1.35.0-4.3.1.i586",
"product": {
"name": "busybox-static-1.35.0-4.3.1.i586",
"product_id": "busybox-static-1.35.0-4.3.1.i586"
}
},
{
"category": "product_version",
"name": "busybox-testsuite-1.35.0-4.3.1.i586",
"product": {
"name": "busybox-testsuite-1.35.0-4.3.1.i586",
"product_id": "busybox-testsuite-1.35.0-4.3.1.i586"
}
},
{
"category": "product_version",
"name": "busybox-warewulf3-1.35.0-4.3.1.i586",
"product": {
"name": "busybox-warewulf3-1.35.0-4.3.1.i586",
"product_id": "busybox-warewulf3-1.35.0-4.3.1.i586"
}
}
],
"category": "architecture",
"name": "i586"
},
{
"branches": [
{
"category": "product_version",
"name": "busybox-1.35.0-4.3.1.ppc64le",
"product": {
"name": "busybox-1.35.0-4.3.1.ppc64le",
"product_id": "busybox-1.35.0-4.3.1.ppc64le"
}
},
{
"category": "product_version",
"name": "busybox-static-1.35.0-4.3.1.ppc64le",
"product": {
"name": "busybox-static-1.35.0-4.3.1.ppc64le",
"product_id": "busybox-static-1.35.0-4.3.1.ppc64le"
}
},
{
"category": "product_version",
"name": "busybox-testsuite-1.35.0-4.3.1.ppc64le",
"product": {
"name": "busybox-testsuite-1.35.0-4.3.1.ppc64le",
"product_id": "busybox-testsuite-1.35.0-4.3.1.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "busybox-1.35.0-4.3.1.s390",
"product": {
"name": "busybox-1.35.0-4.3.1.s390",
"product_id": "busybox-1.35.0-4.3.1.s390"
}
},
{
"category": "product_version",
"name": "busybox-static-1.35.0-4.3.1.s390",
"product": {
"name": "busybox-static-1.35.0-4.3.1.s390",
"product_id": "busybox-static-1.35.0-4.3.1.s390"
}
},
{
"category": "product_version",
"name": "busybox-testsuite-1.35.0-4.3.1.s390",
"product": {
"name": "busybox-testsuite-1.35.0-4.3.1.s390",
"product_id": "busybox-testsuite-1.35.0-4.3.1.s390"
}
}
],
"category": "architecture",
"name": "s390"
},
{
"branches": [
{
"category": "product_version",
"name": "busybox-1.35.0-4.3.1.s390x",
"product": {
"name": "busybox-1.35.0-4.3.1.s390x",
"product_id": "busybox-1.35.0-4.3.1.s390x"
}
},
{
"category": "product_version",
"name": "busybox-static-1.35.0-4.3.1.s390x",
"product": {
"name": "busybox-static-1.35.0-4.3.1.s390x",
"product_id": "busybox-static-1.35.0-4.3.1.s390x"
}
},
{
"category": "product_version",
"name": "busybox-testsuite-1.35.0-4.3.1.s390x",
"product": {
"name": "busybox-testsuite-1.35.0-4.3.1.s390x",
"product_id": "busybox-testsuite-1.35.0-4.3.1.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "busybox-1.35.0-4.3.1.x86_64",
"product": {
"name": "busybox-1.35.0-4.3.1.x86_64",
"product_id": "busybox-1.35.0-4.3.1.x86_64"
}
},
{
"category": "product_version",
"name": "busybox-static-1.35.0-4.3.1.x86_64",
"product": {
"name": "busybox-static-1.35.0-4.3.1.x86_64",
"product_id": "busybox-static-1.35.0-4.3.1.x86_64"
}
},
{
"category": "product_version",
"name": "busybox-testsuite-1.35.0-4.3.1.x86_64",
"product": {
"name": "busybox-testsuite-1.35.0-4.3.1.x86_64",
"product_id": "busybox-testsuite-1.35.0-4.3.1.x86_64"
}
},
{
"category": "product_version",
"name": "busybox-warewulf3-1.35.0-4.3.1.x86_64",
"product": {
"name": "busybox-warewulf3-1.35.0-4.3.1.x86_64",
"product_id": "busybox-warewulf3-1.35.0-4.3.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE OpenStack Cloud 9",
"product": {
"name": "SUSE OpenStack Cloud 9",
"product_id": "SUSE OpenStack Cloud 9",
"product_identification_helper": {
"cpe": "cpe:/o:suse:suse-openstack-cloud:9"
}
}
},
{
"category": "product_name",
"name": "SUSE OpenStack Cloud Crowbar 9",
"product": {
"name": "SUSE OpenStack Cloud Crowbar 9",
"product_id": "SUSE OpenStack Cloud Crowbar 9",
"product_identification_helper": {
"cpe": "cpe:/o:suse:suse-openstack-cloud-crowbar:9"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server for SAP Applications 12 SP4",
"product": {
"name": "SUSE Linux Enterprise Server for SAP Applications 12 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP4",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles_sap:12:sp4"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server 12 SP2-BCL",
"product": {
"name": "SUSE Linux Enterprise Server 12 SP2-BCL",
"product_id": "SUSE Linux Enterprise Server 12 SP2-BCL",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles-bcl:12:sp2"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server 12 SP3-BCL",
"product": {
"name": "SUSE Linux Enterprise Server 12 SP3-BCL",
"product_id": "SUSE Linux Enterprise Server 12 SP3-BCL",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles-bcl:12:sp3"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server 12 SP4-LTSS",
"product": {
"name": "SUSE Linux Enterprise Server 12 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP4-LTSS",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles-ltss:12:sp4"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server 12 SP5",
"product": {
"name": "SUSE Linux Enterprise Server 12 SP5",
"product_id": "SUSE Linux Enterprise Server 12 SP5",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles:12:sp5"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server for SAP Applications 12 SP5",
"product": {
"name": "SUSE Linux Enterprise Server for SAP Applications 12 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles_sap:12:sp5"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "busybox-1.35.0-4.3.1.x86_64 as component of SUSE OpenStack Cloud 9",
"product_id": "SUSE OpenStack Cloud 9:busybox-1.35.0-4.3.1.x86_64"
},
"product_reference": "busybox-1.35.0-4.3.1.x86_64",
"relates_to_product_reference": "SUSE OpenStack Cloud 9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "busybox-1.35.0-4.3.1.x86_64 as component of SUSE OpenStack Cloud Crowbar 9",
"product_id": "SUSE OpenStack Cloud Crowbar 9:busybox-1.35.0-4.3.1.x86_64"
},
"product_reference": "busybox-1.35.0-4.3.1.x86_64",
"relates_to_product_reference": "SUSE OpenStack Cloud Crowbar 9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "busybox-1.35.0-4.3.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP4:busybox-1.35.0-4.3.1.ppc64le"
},
"product_reference": "busybox-1.35.0-4.3.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "busybox-1.35.0-4.3.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP4:busybox-1.35.0-4.3.1.x86_64"
},
"product_reference": "busybox-1.35.0-4.3.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "busybox-1.35.0-4.3.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP2-BCL",
"product_id": "SUSE Linux Enterprise Server 12 SP2-BCL:busybox-1.35.0-4.3.1.x86_64"
},
"product_reference": "busybox-1.35.0-4.3.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-BCL"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "busybox-1.35.0-4.3.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP3-BCL",
"product_id": "SUSE Linux Enterprise Server 12 SP3-BCL:busybox-1.35.0-4.3.1.x86_64"
},
"product_reference": "busybox-1.35.0-4.3.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-BCL"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "busybox-1.35.0-4.3.1.aarch64 as component of SUSE Linux Enterprise Server 12 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.aarch64"
},
"product_reference": "busybox-1.35.0-4.3.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "busybox-1.35.0-4.3.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.ppc64le"
},
"product_reference": "busybox-1.35.0-4.3.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "busybox-1.35.0-4.3.1.s390x as component of SUSE Linux Enterprise Server 12 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.s390x"
},
"product_reference": "busybox-1.35.0-4.3.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "busybox-1.35.0-4.3.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.x86_64"
},
"product_reference": "busybox-1.35.0-4.3.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "busybox-1.35.0-4.3.1.aarch64 as component of SUSE Linux Enterprise Server 12 SP5",
"product_id": "SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.aarch64"
},
"product_reference": "busybox-1.35.0-4.3.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "busybox-1.35.0-4.3.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP5",
"product_id": "SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.ppc64le"
},
"product_reference": "busybox-1.35.0-4.3.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "busybox-1.35.0-4.3.1.s390x as component of SUSE Linux Enterprise Server 12 SP5",
"product_id": "SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.s390x"
},
"product_reference": "busybox-1.35.0-4.3.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "busybox-1.35.0-4.3.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP5",
"product_id": "SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.x86_64"
},
"product_reference": "busybox-1.35.0-4.3.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "busybox-1.35.0-4.3.1.aarch64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.aarch64"
},
"product_reference": "busybox-1.35.0-4.3.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "busybox-1.35.0-4.3.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.ppc64le"
},
"product_reference": "busybox-1.35.0-4.3.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "busybox-1.35.0-4.3.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.s390x"
},
"product_reference": "busybox-1.35.0-4.3.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "busybox-1.35.0-4.3.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.x86_64"
},
"product_reference": "busybox-1.35.0-4.3.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2011-5325",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2011-5325"
}
],
"notes": [
{
"category": "general",
"text": "Directory traversal vulnerability in the BusyBox implementation of tar before 1.22.0 v5 allows remote attackers to point to files outside the current working directory via a symlink.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP2-BCL:busybox-1.35.0-4.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:busybox-1.35.0-4.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:busybox-1.35.0-4.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:busybox-1.35.0-4.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.x86_64",
"SUSE OpenStack Cloud 9:busybox-1.35.0-4.3.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:busybox-1.35.0-4.3.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2011-5325",
"url": "https://www.suse.com/security/cve/CVE-2011-5325"
},
{
"category": "external",
"summary": "SUSE Bug 951562 for CVE-2011-5325",
"url": "https://bugzilla.suse.com/951562"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP2-BCL:busybox-1.35.0-4.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:busybox-1.35.0-4.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:busybox-1.35.0-4.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:busybox-1.35.0-4.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.x86_64",
"SUSE OpenStack Cloud 9:busybox-1.35.0-4.3.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:busybox-1.35.0-4.3.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP2-BCL:busybox-1.35.0-4.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:busybox-1.35.0-4.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:busybox-1.35.0-4.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:busybox-1.35.0-4.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.x86_64",
"SUSE OpenStack Cloud 9:busybox-1.35.0-4.3.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:busybox-1.35.0-4.3.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-11-28T10:23:47Z",
"details": "moderate"
}
],
"title": "CVE-2011-5325"
},
{
"cve": "CVE-2014-9645",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2014-9645"
}
],
"notes": [
{
"category": "general",
"text": "The add_probe function in modutils/modprobe.c in BusyBox before 1.23.0 allows local users to bypass intended restrictions on loading kernel modules via a / (slash) character in a module name, as demonstrated by an \"ifconfig /usbserial up\" command or a \"mount -t /snd_pcm none /\" command.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP2-BCL:busybox-1.35.0-4.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:busybox-1.35.0-4.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:busybox-1.35.0-4.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:busybox-1.35.0-4.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.x86_64",
"SUSE OpenStack Cloud 9:busybox-1.35.0-4.3.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:busybox-1.35.0-4.3.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2014-9645",
"url": "https://www.suse.com/security/cve/CVE-2014-9645"
},
{
"category": "external",
"summary": "SUSE Bug 914423 for CVE-2014-9645",
"url": "https://bugzilla.suse.com/914423"
},
{
"category": "external",
"summary": "SUSE Bug 914660 for CVE-2014-9645",
"url": "https://bugzilla.suse.com/914660"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP2-BCL:busybox-1.35.0-4.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:busybox-1.35.0-4.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:busybox-1.35.0-4.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:busybox-1.35.0-4.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.x86_64",
"SUSE OpenStack Cloud 9:busybox-1.35.0-4.3.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:busybox-1.35.0-4.3.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Server 12 SP2-BCL:busybox-1.35.0-4.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:busybox-1.35.0-4.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:busybox-1.35.0-4.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:busybox-1.35.0-4.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.x86_64",
"SUSE OpenStack Cloud 9:busybox-1.35.0-4.3.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:busybox-1.35.0-4.3.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-11-28T10:23:47Z",
"details": "low"
}
],
"title": "CVE-2014-9645"
},
{
"cve": "CVE-2015-9261",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2015-9261"
}
],
"notes": [
{
"category": "general",
"text": "huft_build in archival/libarchive/decompress_gunzip.c in BusyBox before 1.27.2 misuses a pointer, causing segfaults and an application crash during an unzip operation on a specially crafted ZIP file.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP2-BCL:busybox-1.35.0-4.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:busybox-1.35.0-4.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:busybox-1.35.0-4.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:busybox-1.35.0-4.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.x86_64",
"SUSE OpenStack Cloud 9:busybox-1.35.0-4.3.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:busybox-1.35.0-4.3.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2015-9261",
"url": "https://www.suse.com/security/cve/CVE-2015-9261"
},
{
"category": "external",
"summary": "SUSE Bug 1102912 for CVE-2015-9261",
"url": "https://bugzilla.suse.com/1102912"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP2-BCL:busybox-1.35.0-4.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:busybox-1.35.0-4.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:busybox-1.35.0-4.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:busybox-1.35.0-4.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.x86_64",
"SUSE OpenStack Cloud 9:busybox-1.35.0-4.3.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:busybox-1.35.0-4.3.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Server 12 SP2-BCL:busybox-1.35.0-4.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:busybox-1.35.0-4.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:busybox-1.35.0-4.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:busybox-1.35.0-4.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.x86_64",
"SUSE OpenStack Cloud 9:busybox-1.35.0-4.3.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:busybox-1.35.0-4.3.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-11-28T10:23:47Z",
"details": "low"
}
],
"title": "CVE-2015-9261"
},
{
"cve": "CVE-2016-2147",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2016-2147"
}
],
"notes": [
{
"category": "general",
"text": "Integer overflow in the DHCP client (udhcpc) in BusyBox before 1.25.0 allows remote attackers to cause a denial of service (crash) via a malformed RFC1035-encoded domain name, which triggers an out-of-bounds heap write.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP2-BCL:busybox-1.35.0-4.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:busybox-1.35.0-4.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:busybox-1.35.0-4.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:busybox-1.35.0-4.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.x86_64",
"SUSE OpenStack Cloud 9:busybox-1.35.0-4.3.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:busybox-1.35.0-4.3.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2016-2147",
"url": "https://www.suse.com/security/cve/CVE-2016-2147"
},
{
"category": "external",
"summary": "SUSE Bug 970663 for CVE-2016-2147",
"url": "https://bugzilla.suse.com/970663"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP2-BCL:busybox-1.35.0-4.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:busybox-1.35.0-4.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:busybox-1.35.0-4.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:busybox-1.35.0-4.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.x86_64",
"SUSE OpenStack Cloud 9:busybox-1.35.0-4.3.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:busybox-1.35.0-4.3.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP2-BCL:busybox-1.35.0-4.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:busybox-1.35.0-4.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:busybox-1.35.0-4.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:busybox-1.35.0-4.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.x86_64",
"SUSE OpenStack Cloud 9:busybox-1.35.0-4.3.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:busybox-1.35.0-4.3.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-11-28T10:23:47Z",
"details": "important"
}
],
"title": "CVE-2016-2147"
},
{
"cve": "CVE-2016-2148",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2016-2148"
}
],
"notes": [
{
"category": "general",
"text": "Heap-based buffer overflow in the DHCP client (udhcpc) in BusyBox before 1.25.0 allows remote attackers to have unspecified impact via vectors involving OPTION_6RD parsing.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP2-BCL:busybox-1.35.0-4.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:busybox-1.35.0-4.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:busybox-1.35.0-4.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:busybox-1.35.0-4.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.x86_64",
"SUSE OpenStack Cloud 9:busybox-1.35.0-4.3.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:busybox-1.35.0-4.3.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2016-2148",
"url": "https://www.suse.com/security/cve/CVE-2016-2148"
},
{
"category": "external",
"summary": "SUSE Bug 970662 for CVE-2016-2148",
"url": "https://bugzilla.suse.com/970662"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP2-BCL:busybox-1.35.0-4.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:busybox-1.35.0-4.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:busybox-1.35.0-4.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:busybox-1.35.0-4.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.x86_64",
"SUSE OpenStack Cloud 9:busybox-1.35.0-4.3.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:busybox-1.35.0-4.3.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP2-BCL:busybox-1.35.0-4.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:busybox-1.35.0-4.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:busybox-1.35.0-4.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:busybox-1.35.0-4.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.x86_64",
"SUSE OpenStack Cloud 9:busybox-1.35.0-4.3.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:busybox-1.35.0-4.3.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-11-28T10:23:47Z",
"details": "moderate"
}
],
"title": "CVE-2016-2148"
},
{
"cve": "CVE-2016-6301",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2016-6301"
}
],
"notes": [
{
"category": "general",
"text": "The recv_and_process_client_pkt function in networking/ntpd.c in busybox allows remote attackers to cause a denial of service (CPU and bandwidth consumption) via a forged NTP packet, which triggers a communication loop.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP2-BCL:busybox-1.35.0-4.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:busybox-1.35.0-4.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:busybox-1.35.0-4.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:busybox-1.35.0-4.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.x86_64",
"SUSE OpenStack Cloud 9:busybox-1.35.0-4.3.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:busybox-1.35.0-4.3.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2016-6301",
"url": "https://www.suse.com/security/cve/CVE-2016-6301"
},
{
"category": "external",
"summary": "SUSE Bug 991940 for CVE-2016-6301",
"url": "https://bugzilla.suse.com/991940"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP2-BCL:busybox-1.35.0-4.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:busybox-1.35.0-4.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:busybox-1.35.0-4.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:busybox-1.35.0-4.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.x86_64",
"SUSE OpenStack Cloud 9:busybox-1.35.0-4.3.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:busybox-1.35.0-4.3.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Server 12 SP2-BCL:busybox-1.35.0-4.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:busybox-1.35.0-4.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:busybox-1.35.0-4.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:busybox-1.35.0-4.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.x86_64",
"SUSE OpenStack Cloud 9:busybox-1.35.0-4.3.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:busybox-1.35.0-4.3.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-11-28T10:23:47Z",
"details": "moderate"
}
],
"title": "CVE-2016-6301"
},
{
"cve": "CVE-2017-15873",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-15873"
}
],
"notes": [
{
"category": "general",
"text": "The get_next_block function in archival/libarchive/decompress_bunzip2.c in BusyBox 1.27.2 has an Integer Overflow that may lead to a write access violation.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP2-BCL:busybox-1.35.0-4.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:busybox-1.35.0-4.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:busybox-1.35.0-4.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:busybox-1.35.0-4.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.x86_64",
"SUSE OpenStack Cloud 9:busybox-1.35.0-4.3.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:busybox-1.35.0-4.3.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-15873",
"url": "https://www.suse.com/security/cve/CVE-2017-15873"
},
{
"category": "external",
"summary": "SUSE Bug 1064976 for CVE-2017-15873",
"url": "https://bugzilla.suse.com/1064976"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP2-BCL:busybox-1.35.0-4.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:busybox-1.35.0-4.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:busybox-1.35.0-4.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:busybox-1.35.0-4.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.x86_64",
"SUSE OpenStack Cloud 9:busybox-1.35.0-4.3.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:busybox-1.35.0-4.3.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Server 12 SP2-BCL:busybox-1.35.0-4.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:busybox-1.35.0-4.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:busybox-1.35.0-4.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:busybox-1.35.0-4.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.x86_64",
"SUSE OpenStack Cloud 9:busybox-1.35.0-4.3.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:busybox-1.35.0-4.3.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-11-28T10:23:47Z",
"details": "moderate"
}
],
"title": "CVE-2017-15873"
},
{
"cve": "CVE-2017-15874",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-15874"
}
],
"notes": [
{
"category": "general",
"text": "archival/libarchive/decompress_unlzma.c in BusyBox 1.27.2 has an Integer Underflow that leads to a read access violation.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP2-BCL:busybox-1.35.0-4.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:busybox-1.35.0-4.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:busybox-1.35.0-4.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:busybox-1.35.0-4.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.x86_64",
"SUSE OpenStack Cloud 9:busybox-1.35.0-4.3.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:busybox-1.35.0-4.3.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-15874",
"url": "https://www.suse.com/security/cve/CVE-2017-15874"
},
{
"category": "external",
"summary": "SUSE Bug 1064978 for CVE-2017-15874",
"url": "https://bugzilla.suse.com/1064978"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP2-BCL:busybox-1.35.0-4.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:busybox-1.35.0-4.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:busybox-1.35.0-4.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:busybox-1.35.0-4.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.x86_64",
"SUSE OpenStack Cloud 9:busybox-1.35.0-4.3.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:busybox-1.35.0-4.3.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.3,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Server 12 SP2-BCL:busybox-1.35.0-4.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:busybox-1.35.0-4.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:busybox-1.35.0-4.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:busybox-1.35.0-4.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.x86_64",
"SUSE OpenStack Cloud 9:busybox-1.35.0-4.3.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:busybox-1.35.0-4.3.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-11-28T10:23:47Z",
"details": "low"
}
],
"title": "CVE-2017-15874"
},
{
"cve": "CVE-2017-16544",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-16544"
}
],
"notes": [
{
"category": "general",
"text": "In the add_match function in libbb/lineedit.c in BusyBox through 1.27.2, the tab autocomplete feature of the shell, used to get a list of filenames in a directory, does not sanitize filenames and results in executing any escape sequence in the terminal. This could potentially result in code execution, arbitrary file writes, or other attacks.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP2-BCL:busybox-1.35.0-4.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:busybox-1.35.0-4.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:busybox-1.35.0-4.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:busybox-1.35.0-4.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.x86_64",
"SUSE OpenStack Cloud 9:busybox-1.35.0-4.3.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:busybox-1.35.0-4.3.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-16544",
"url": "https://www.suse.com/security/cve/CVE-2017-16544"
},
{
"category": "external",
"summary": "SUSE Bug 1069412 for CVE-2017-16544",
"url": "https://bugzilla.suse.com/1069412"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP2-BCL:busybox-1.35.0-4.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:busybox-1.35.0-4.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:busybox-1.35.0-4.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:busybox-1.35.0-4.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.x86_64",
"SUSE OpenStack Cloud 9:busybox-1.35.0-4.3.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:busybox-1.35.0-4.3.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Server 12 SP2-BCL:busybox-1.35.0-4.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:busybox-1.35.0-4.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:busybox-1.35.0-4.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:busybox-1.35.0-4.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.x86_64",
"SUSE OpenStack Cloud 9:busybox-1.35.0-4.3.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:busybox-1.35.0-4.3.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-11-28T10:23:47Z",
"details": "moderate"
}
],
"title": "CVE-2017-16544"
},
{
"cve": "CVE-2018-1000500",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2018-1000500"
}
],
"notes": [
{
"category": "general",
"text": "Busybox contains a Missing SSL certificate validation vulnerability in The \"busybox wget\" applet that can result in arbitrary code execution. This attack appear to be exploitable via Simply download any file over HTTPS using \"busybox wget https://compromised-domain.com/important-file\".",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP2-BCL:busybox-1.35.0-4.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:busybox-1.35.0-4.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:busybox-1.35.0-4.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:busybox-1.35.0-4.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.x86_64",
"SUSE OpenStack Cloud 9:busybox-1.35.0-4.3.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:busybox-1.35.0-4.3.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2018-1000500",
"url": "https://www.suse.com/security/cve/CVE-2018-1000500"
},
{
"category": "external",
"summary": "SUSE Bug 1099263 for CVE-2018-1000500",
"url": "https://bugzilla.suse.com/1099263"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP2-BCL:busybox-1.35.0-4.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:busybox-1.35.0-4.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:busybox-1.35.0-4.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:busybox-1.35.0-4.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.x86_64",
"SUSE OpenStack Cloud 9:busybox-1.35.0-4.3.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:busybox-1.35.0-4.3.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Server 12 SP2-BCL:busybox-1.35.0-4.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:busybox-1.35.0-4.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:busybox-1.35.0-4.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:busybox-1.35.0-4.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.x86_64",
"SUSE OpenStack Cloud 9:busybox-1.35.0-4.3.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:busybox-1.35.0-4.3.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-11-28T10:23:47Z",
"details": "important"
}
],
"title": "CVE-2018-1000500"
},
{
"cve": "CVE-2018-1000517",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2018-1000517"
}
],
"notes": [
{
"category": "general",
"text": "BusyBox project BusyBox wget version prior to commit 8e2174e9bd836e53c8b9c6e00d1bc6e2a718686e contains a Buffer Overflow vulnerability in Busybox wget that can result in heap buffer overflow. This attack appear to be exploitable via network connectivity. This vulnerability appears to have been fixed in after commit 8e2174e9bd836e53c8b9c6e00d1bc6e2a718686e.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP2-BCL:busybox-1.35.0-4.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:busybox-1.35.0-4.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:busybox-1.35.0-4.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:busybox-1.35.0-4.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.x86_64",
"SUSE OpenStack Cloud 9:busybox-1.35.0-4.3.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:busybox-1.35.0-4.3.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2018-1000517",
"url": "https://www.suse.com/security/cve/CVE-2018-1000517"
},
{
"category": "external",
"summary": "SUSE Bug 1099260 for CVE-2018-1000517",
"url": "https://bugzilla.suse.com/1099260"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP2-BCL:busybox-1.35.0-4.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:busybox-1.35.0-4.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:busybox-1.35.0-4.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:busybox-1.35.0-4.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.x86_64",
"SUSE OpenStack Cloud 9:busybox-1.35.0-4.3.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:busybox-1.35.0-4.3.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.6,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Server 12 SP2-BCL:busybox-1.35.0-4.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:busybox-1.35.0-4.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:busybox-1.35.0-4.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:busybox-1.35.0-4.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.x86_64",
"SUSE OpenStack Cloud 9:busybox-1.35.0-4.3.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:busybox-1.35.0-4.3.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-11-28T10:23:47Z",
"details": "important"
}
],
"title": "CVE-2018-1000517"
},
{
"cve": "CVE-2018-20679",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2018-20679"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in BusyBox before 1.30.0. An out of bounds read in udhcp components (consumed by the DHCP server, client, and relay) allows a remote attacker to leak sensitive information from the stack by sending a crafted DHCP message. This is related to verification in udhcp_get_option() in networking/udhcp/common.c that 4-byte options are indeed 4 bytes.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP2-BCL:busybox-1.35.0-4.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:busybox-1.35.0-4.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:busybox-1.35.0-4.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:busybox-1.35.0-4.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.x86_64",
"SUSE OpenStack Cloud 9:busybox-1.35.0-4.3.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:busybox-1.35.0-4.3.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2018-20679",
"url": "https://www.suse.com/security/cve/CVE-2018-20679"
},
{
"category": "external",
"summary": "SUSE Bug 1121426 for CVE-2018-20679",
"url": "https://bugzilla.suse.com/1121426"
},
{
"category": "external",
"summary": "SUSE Bug 1121428 for CVE-2018-20679",
"url": "https://bugzilla.suse.com/1121428"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP2-BCL:busybox-1.35.0-4.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:busybox-1.35.0-4.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:busybox-1.35.0-4.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:busybox-1.35.0-4.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.x86_64",
"SUSE OpenStack Cloud 9:busybox-1.35.0-4.3.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:busybox-1.35.0-4.3.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Server 12 SP2-BCL:busybox-1.35.0-4.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:busybox-1.35.0-4.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:busybox-1.35.0-4.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:busybox-1.35.0-4.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.x86_64",
"SUSE OpenStack Cloud 9:busybox-1.35.0-4.3.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:busybox-1.35.0-4.3.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-11-28T10:23:47Z",
"details": "moderate"
}
],
"title": "CVE-2018-20679"
},
{
"cve": "CVE-2019-5747",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-5747"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in BusyBox through 1.30.0. An out of bounds read in udhcp components (consumed by the DHCP client, server, and/or relay) might allow a remote attacker to leak sensitive information from the stack by sending a crafted DHCP message. This is related to assurance of a 4-byte length when decoding DHCP_SUBNET. NOTE: this issue exists because of an incomplete fix for CVE-2018-20679.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP2-BCL:busybox-1.35.0-4.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:busybox-1.35.0-4.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:busybox-1.35.0-4.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:busybox-1.35.0-4.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.x86_64",
"SUSE OpenStack Cloud 9:busybox-1.35.0-4.3.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:busybox-1.35.0-4.3.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-5747",
"url": "https://www.suse.com/security/cve/CVE-2019-5747"
},
{
"category": "external",
"summary": "SUSE Bug 1121426 for CVE-2019-5747",
"url": "https://bugzilla.suse.com/1121426"
},
{
"category": "external",
"summary": "SUSE Bug 1121428 for CVE-2019-5747",
"url": "https://bugzilla.suse.com/1121428"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP2-BCL:busybox-1.35.0-4.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:busybox-1.35.0-4.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:busybox-1.35.0-4.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:busybox-1.35.0-4.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.x86_64",
"SUSE OpenStack Cloud 9:busybox-1.35.0-4.3.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:busybox-1.35.0-4.3.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.5,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP2-BCL:busybox-1.35.0-4.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:busybox-1.35.0-4.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:busybox-1.35.0-4.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:busybox-1.35.0-4.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.x86_64",
"SUSE OpenStack Cloud 9:busybox-1.35.0-4.3.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:busybox-1.35.0-4.3.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-11-28T10:23:47Z",
"details": "low"
}
],
"title": "CVE-2019-5747"
},
{
"cve": "CVE-2021-28831",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-28831"
}
],
"notes": [
{
"category": "general",
"text": "decompress_gunzip.c in BusyBox through 1.32.1 mishandles the error bit on the huft_build result pointer, with a resultant invalid free or segmentation fault, via malformed gzip data.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP2-BCL:busybox-1.35.0-4.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:busybox-1.35.0-4.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:busybox-1.35.0-4.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:busybox-1.35.0-4.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.x86_64",
"SUSE OpenStack Cloud 9:busybox-1.35.0-4.3.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:busybox-1.35.0-4.3.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-28831",
"url": "https://www.suse.com/security/cve/CVE-2021-28831"
},
{
"category": "external",
"summary": "SUSE Bug 1184522 for CVE-2021-28831",
"url": "https://bugzilla.suse.com/1184522"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP2-BCL:busybox-1.35.0-4.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:busybox-1.35.0-4.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:busybox-1.35.0-4.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:busybox-1.35.0-4.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.x86_64",
"SUSE OpenStack Cloud 9:busybox-1.35.0-4.3.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:busybox-1.35.0-4.3.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP2-BCL:busybox-1.35.0-4.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:busybox-1.35.0-4.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:busybox-1.35.0-4.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:busybox-1.35.0-4.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.x86_64",
"SUSE OpenStack Cloud 9:busybox-1.35.0-4.3.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:busybox-1.35.0-4.3.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-11-28T10:23:47Z",
"details": "important"
}
],
"title": "CVE-2021-28831"
},
{
"cve": "CVE-2021-42373",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-42373"
}
],
"notes": [
{
"category": "general",
"text": "A NULL pointer dereference in Busybox\u0027s man applet leads to denial of service when a section name is supplied but no page argument is given",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP2-BCL:busybox-1.35.0-4.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:busybox-1.35.0-4.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:busybox-1.35.0-4.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:busybox-1.35.0-4.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.x86_64",
"SUSE OpenStack Cloud 9:busybox-1.35.0-4.3.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:busybox-1.35.0-4.3.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-42373",
"url": "https://www.suse.com/security/cve/CVE-2021-42373"
},
{
"category": "external",
"summary": "SUSE Bug 1192869 for CVE-2021-42373",
"url": "https://bugzilla.suse.com/1192869"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP2-BCL:busybox-1.35.0-4.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:busybox-1.35.0-4.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:busybox-1.35.0-4.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:busybox-1.35.0-4.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.x86_64",
"SUSE OpenStack Cloud 9:busybox-1.35.0-4.3.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:busybox-1.35.0-4.3.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP2-BCL:busybox-1.35.0-4.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:busybox-1.35.0-4.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:busybox-1.35.0-4.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:busybox-1.35.0-4.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.x86_64",
"SUSE OpenStack Cloud 9:busybox-1.35.0-4.3.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:busybox-1.35.0-4.3.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-11-28T10:23:47Z",
"details": "moderate"
}
],
"title": "CVE-2021-42373"
},
{
"cve": "CVE-2021-42374",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-42374"
}
],
"notes": [
{
"category": "general",
"text": "An out-of-bounds heap read in Busybox\u0027s unlzma applet leads to information leak and denial of service when crafted LZMA-compressed input is decompressed. This can be triggered by any applet/format that",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP2-BCL:busybox-1.35.0-4.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:busybox-1.35.0-4.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:busybox-1.35.0-4.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:busybox-1.35.0-4.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.x86_64",
"SUSE OpenStack Cloud 9:busybox-1.35.0-4.3.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:busybox-1.35.0-4.3.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-42374",
"url": "https://www.suse.com/security/cve/CVE-2021-42374"
},
{
"category": "external",
"summary": "SUSE Bug 1192869 for CVE-2021-42374",
"url": "https://bugzilla.suse.com/1192869"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP2-BCL:busybox-1.35.0-4.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:busybox-1.35.0-4.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:busybox-1.35.0-4.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:busybox-1.35.0-4.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.x86_64",
"SUSE OpenStack Cloud 9:busybox-1.35.0-4.3.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:busybox-1.35.0-4.3.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP2-BCL:busybox-1.35.0-4.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:busybox-1.35.0-4.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:busybox-1.35.0-4.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:busybox-1.35.0-4.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.x86_64",
"SUSE OpenStack Cloud 9:busybox-1.35.0-4.3.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:busybox-1.35.0-4.3.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-11-28T10:23:47Z",
"details": "moderate"
}
],
"title": "CVE-2021-42374"
},
{
"cve": "CVE-2021-42375",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-42375"
}
],
"notes": [
{
"category": "general",
"text": "An incorrect handling of a special element in Busybox\u0027s ash applet leads to denial of service when processing a crafted shell command, due to the shell mistaking specific characters for reserved characters. This may be used for DoS under rare conditions of filtered command input.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP2-BCL:busybox-1.35.0-4.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:busybox-1.35.0-4.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:busybox-1.35.0-4.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:busybox-1.35.0-4.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.x86_64",
"SUSE OpenStack Cloud 9:busybox-1.35.0-4.3.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:busybox-1.35.0-4.3.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-42375",
"url": "https://www.suse.com/security/cve/CVE-2021-42375"
},
{
"category": "external",
"summary": "SUSE Bug 1192869 for CVE-2021-42375",
"url": "https://bugzilla.suse.com/1192869"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP2-BCL:busybox-1.35.0-4.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:busybox-1.35.0-4.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:busybox-1.35.0-4.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:busybox-1.35.0-4.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.x86_64",
"SUSE OpenStack Cloud 9:busybox-1.35.0-4.3.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:busybox-1.35.0-4.3.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.1,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP2-BCL:busybox-1.35.0-4.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:busybox-1.35.0-4.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:busybox-1.35.0-4.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:busybox-1.35.0-4.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.x86_64",
"SUSE OpenStack Cloud 9:busybox-1.35.0-4.3.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:busybox-1.35.0-4.3.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-11-28T10:23:47Z",
"details": "moderate"
}
],
"title": "CVE-2021-42375"
},
{
"cve": "CVE-2021-42376",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-42376"
}
],
"notes": [
{
"category": "general",
"text": "A NULL pointer dereference in Busybox\u0027s hush applet leads to denial of service when processing a crafted shell command, due to missing validation after a \\x03 delimiter character. This may be used for DoS under very rare conditions of filtered command input.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP2-BCL:busybox-1.35.0-4.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:busybox-1.35.0-4.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:busybox-1.35.0-4.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:busybox-1.35.0-4.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.x86_64",
"SUSE OpenStack Cloud 9:busybox-1.35.0-4.3.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:busybox-1.35.0-4.3.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-42376",
"url": "https://www.suse.com/security/cve/CVE-2021-42376"
},
{
"category": "external",
"summary": "SUSE Bug 1192869 for CVE-2021-42376",
"url": "https://bugzilla.suse.com/1192869"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP2-BCL:busybox-1.35.0-4.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:busybox-1.35.0-4.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:busybox-1.35.0-4.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:busybox-1.35.0-4.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.x86_64",
"SUSE OpenStack Cloud 9:busybox-1.35.0-4.3.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:busybox-1.35.0-4.3.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.1,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP2-BCL:busybox-1.35.0-4.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:busybox-1.35.0-4.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:busybox-1.35.0-4.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:busybox-1.35.0-4.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.x86_64",
"SUSE OpenStack Cloud 9:busybox-1.35.0-4.3.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:busybox-1.35.0-4.3.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-11-28T10:23:47Z",
"details": "moderate"
}
],
"title": "CVE-2021-42376"
},
{
"cve": "CVE-2021-42377",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-42377"
}
],
"notes": [
{
"category": "general",
"text": "An attacker-controlled pointer free in Busybox\u0027s hush applet leads to denial of service and possible code execution when processing a crafted shell command, due to the shell mishandling the \u0026\u0026\u0026 string. This may be used for remote code execution under rare conditions of filtered command input.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP2-BCL:busybox-1.35.0-4.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:busybox-1.35.0-4.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:busybox-1.35.0-4.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:busybox-1.35.0-4.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.x86_64",
"SUSE OpenStack Cloud 9:busybox-1.35.0-4.3.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:busybox-1.35.0-4.3.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-42377",
"url": "https://www.suse.com/security/cve/CVE-2021-42377"
},
{
"category": "external",
"summary": "SUSE Bug 1192869 for CVE-2021-42377",
"url": "https://bugzilla.suse.com/1192869"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP2-BCL:busybox-1.35.0-4.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:busybox-1.35.0-4.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:busybox-1.35.0-4.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:busybox-1.35.0-4.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.x86_64",
"SUSE OpenStack Cloud 9:busybox-1.35.0-4.3.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:busybox-1.35.0-4.3.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP2-BCL:busybox-1.35.0-4.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:busybox-1.35.0-4.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:busybox-1.35.0-4.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:busybox-1.35.0-4.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.x86_64",
"SUSE OpenStack Cloud 9:busybox-1.35.0-4.3.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:busybox-1.35.0-4.3.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-11-28T10:23:47Z",
"details": "moderate"
}
],
"title": "CVE-2021-42377"
},
{
"cve": "CVE-2021-42378",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-42378"
}
],
"notes": [
{
"category": "general",
"text": "A use-after-free in Busybox\u0027s awk applet leads to denial of service and possibly code execution when processing a crafted awk pattern in the getvar_i function",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP2-BCL:busybox-1.35.0-4.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:busybox-1.35.0-4.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:busybox-1.35.0-4.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:busybox-1.35.0-4.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.x86_64",
"SUSE OpenStack Cloud 9:busybox-1.35.0-4.3.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:busybox-1.35.0-4.3.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-42378",
"url": "https://www.suse.com/security/cve/CVE-2021-42378"
},
{
"category": "external",
"summary": "SUSE Bug 1192869 for CVE-2021-42378",
"url": "https://bugzilla.suse.com/1192869"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP2-BCL:busybox-1.35.0-4.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:busybox-1.35.0-4.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:busybox-1.35.0-4.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:busybox-1.35.0-4.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.x86_64",
"SUSE OpenStack Cloud 9:busybox-1.35.0-4.3.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:busybox-1.35.0-4.3.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.6,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP2-BCL:busybox-1.35.0-4.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:busybox-1.35.0-4.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:busybox-1.35.0-4.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:busybox-1.35.0-4.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.x86_64",
"SUSE OpenStack Cloud 9:busybox-1.35.0-4.3.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:busybox-1.35.0-4.3.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-11-28T10:23:47Z",
"details": "moderate"
}
],
"title": "CVE-2021-42378"
},
{
"cve": "CVE-2021-42379",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-42379"
}
],
"notes": [
{
"category": "general",
"text": "A use-after-free in Busybox\u0027s awk applet leads to denial of service and possibly code execution when processing a crafted awk pattern in the next_input_file function",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP2-BCL:busybox-1.35.0-4.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:busybox-1.35.0-4.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:busybox-1.35.0-4.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:busybox-1.35.0-4.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.x86_64",
"SUSE OpenStack Cloud 9:busybox-1.35.0-4.3.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:busybox-1.35.0-4.3.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-42379",
"url": "https://www.suse.com/security/cve/CVE-2021-42379"
},
{
"category": "external",
"summary": "SUSE Bug 1192869 for CVE-2021-42379",
"url": "https://bugzilla.suse.com/1192869"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP2-BCL:busybox-1.35.0-4.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:busybox-1.35.0-4.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:busybox-1.35.0-4.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:busybox-1.35.0-4.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.x86_64",
"SUSE OpenStack Cloud 9:busybox-1.35.0-4.3.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:busybox-1.35.0-4.3.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.6,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP2-BCL:busybox-1.35.0-4.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:busybox-1.35.0-4.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:busybox-1.35.0-4.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:busybox-1.35.0-4.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.x86_64",
"SUSE OpenStack Cloud 9:busybox-1.35.0-4.3.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:busybox-1.35.0-4.3.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-11-28T10:23:47Z",
"details": "moderate"
}
],
"title": "CVE-2021-42379"
},
{
"cve": "CVE-2021-42380",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-42380"
}
],
"notes": [
{
"category": "general",
"text": "A use-after-free in Busybox\u0027s awk applet leads to denial of service and possibly code execution when processing a crafted awk pattern in the clrvar function",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP2-BCL:busybox-1.35.0-4.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:busybox-1.35.0-4.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:busybox-1.35.0-4.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:busybox-1.35.0-4.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.x86_64",
"SUSE OpenStack Cloud 9:busybox-1.35.0-4.3.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:busybox-1.35.0-4.3.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-42380",
"url": "https://www.suse.com/security/cve/CVE-2021-42380"
},
{
"category": "external",
"summary": "SUSE Bug 1192869 for CVE-2021-42380",
"url": "https://bugzilla.suse.com/1192869"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP2-BCL:busybox-1.35.0-4.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:busybox-1.35.0-4.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:busybox-1.35.0-4.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:busybox-1.35.0-4.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.x86_64",
"SUSE OpenStack Cloud 9:busybox-1.35.0-4.3.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:busybox-1.35.0-4.3.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.6,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP2-BCL:busybox-1.35.0-4.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:busybox-1.35.0-4.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:busybox-1.35.0-4.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:busybox-1.35.0-4.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.x86_64",
"SUSE OpenStack Cloud 9:busybox-1.35.0-4.3.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:busybox-1.35.0-4.3.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-11-28T10:23:47Z",
"details": "moderate"
}
],
"title": "CVE-2021-42380"
},
{
"cve": "CVE-2021-42381",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-42381"
}
],
"notes": [
{
"category": "general",
"text": "A use-after-free in Busybox\u0027s awk applet leads to denial of service and possibly code execution when processing a crafted awk pattern in the hash_init function",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP2-BCL:busybox-1.35.0-4.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:busybox-1.35.0-4.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:busybox-1.35.0-4.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:busybox-1.35.0-4.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.x86_64",
"SUSE OpenStack Cloud 9:busybox-1.35.0-4.3.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:busybox-1.35.0-4.3.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-42381",
"url": "https://www.suse.com/security/cve/CVE-2021-42381"
},
{
"category": "external",
"summary": "SUSE Bug 1192869 for CVE-2021-42381",
"url": "https://bugzilla.suse.com/1192869"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP2-BCL:busybox-1.35.0-4.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:busybox-1.35.0-4.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:busybox-1.35.0-4.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:busybox-1.35.0-4.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.x86_64",
"SUSE OpenStack Cloud 9:busybox-1.35.0-4.3.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:busybox-1.35.0-4.3.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.6,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP2-BCL:busybox-1.35.0-4.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:busybox-1.35.0-4.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:busybox-1.35.0-4.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:busybox-1.35.0-4.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.x86_64",
"SUSE OpenStack Cloud 9:busybox-1.35.0-4.3.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:busybox-1.35.0-4.3.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-11-28T10:23:47Z",
"details": "moderate"
}
],
"title": "CVE-2021-42381"
},
{
"cve": "CVE-2021-42382",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-42382"
}
],
"notes": [
{
"category": "general",
"text": "A use-after-free in Busybox\u0027s awk applet leads to denial of service and possibly code execution when processing a crafted awk pattern in the getvar_s function",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP2-BCL:busybox-1.35.0-4.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:busybox-1.35.0-4.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:busybox-1.35.0-4.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:busybox-1.35.0-4.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.x86_64",
"SUSE OpenStack Cloud 9:busybox-1.35.0-4.3.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:busybox-1.35.0-4.3.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-42382",
"url": "https://www.suse.com/security/cve/CVE-2021-42382"
},
{
"category": "external",
"summary": "SUSE Bug 1192869 for CVE-2021-42382",
"url": "https://bugzilla.suse.com/1192869"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP2-BCL:busybox-1.35.0-4.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:busybox-1.35.0-4.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:busybox-1.35.0-4.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:busybox-1.35.0-4.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.x86_64",
"SUSE OpenStack Cloud 9:busybox-1.35.0-4.3.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:busybox-1.35.0-4.3.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.6,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP2-BCL:busybox-1.35.0-4.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:busybox-1.35.0-4.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:busybox-1.35.0-4.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:busybox-1.35.0-4.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.x86_64",
"SUSE OpenStack Cloud 9:busybox-1.35.0-4.3.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:busybox-1.35.0-4.3.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-11-28T10:23:47Z",
"details": "moderate"
}
],
"title": "CVE-2021-42382"
},
{
"cve": "CVE-2021-42383",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-42383"
}
],
"notes": [
{
"category": "general",
"text": "A use-after-free in Busybox\u0027s awk applet leads to denial of service and possibly code execution when processing a crafted awk pattern in the evaluate function",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP2-BCL:busybox-1.35.0-4.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:busybox-1.35.0-4.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:busybox-1.35.0-4.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:busybox-1.35.0-4.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.x86_64",
"SUSE OpenStack Cloud 9:busybox-1.35.0-4.3.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:busybox-1.35.0-4.3.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-42383",
"url": "https://www.suse.com/security/cve/CVE-2021-42383"
},
{
"category": "external",
"summary": "SUSE Bug 1192869 for CVE-2021-42383",
"url": "https://bugzilla.suse.com/1192869"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP2-BCL:busybox-1.35.0-4.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:busybox-1.35.0-4.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:busybox-1.35.0-4.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:busybox-1.35.0-4.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.x86_64",
"SUSE OpenStack Cloud 9:busybox-1.35.0-4.3.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:busybox-1.35.0-4.3.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.6,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP2-BCL:busybox-1.35.0-4.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:busybox-1.35.0-4.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:busybox-1.35.0-4.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:busybox-1.35.0-4.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.x86_64",
"SUSE OpenStack Cloud 9:busybox-1.35.0-4.3.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:busybox-1.35.0-4.3.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-11-28T10:23:47Z",
"details": "moderate"
}
],
"title": "CVE-2021-42383"
},
{
"cve": "CVE-2021-42384",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-42384"
}
],
"notes": [
{
"category": "general",
"text": "A use-after-free in Busybox\u0027s awk applet leads to denial of service and possibly code execution when processing a crafted awk pattern in the handle_special function",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP2-BCL:busybox-1.35.0-4.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:busybox-1.35.0-4.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:busybox-1.35.0-4.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:busybox-1.35.0-4.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.x86_64",
"SUSE OpenStack Cloud 9:busybox-1.35.0-4.3.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:busybox-1.35.0-4.3.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-42384",
"url": "https://www.suse.com/security/cve/CVE-2021-42384"
},
{
"category": "external",
"summary": "SUSE Bug 1192869 for CVE-2021-42384",
"url": "https://bugzilla.suse.com/1192869"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP2-BCL:busybox-1.35.0-4.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:busybox-1.35.0-4.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:busybox-1.35.0-4.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:busybox-1.35.0-4.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.x86_64",
"SUSE OpenStack Cloud 9:busybox-1.35.0-4.3.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:busybox-1.35.0-4.3.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.6,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP2-BCL:busybox-1.35.0-4.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:busybox-1.35.0-4.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:busybox-1.35.0-4.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:busybox-1.35.0-4.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.x86_64",
"SUSE OpenStack Cloud 9:busybox-1.35.0-4.3.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:busybox-1.35.0-4.3.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-11-28T10:23:47Z",
"details": "moderate"
}
],
"title": "CVE-2021-42384"
},
{
"cve": "CVE-2021-42385",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-42385"
}
],
"notes": [
{
"category": "general",
"text": "A use-after-free in Busybox\u0027s awk applet leads to denial of service and possibly code execution when processing a crafted awk pattern in the evaluate function",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP2-BCL:busybox-1.35.0-4.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:busybox-1.35.0-4.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:busybox-1.35.0-4.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:busybox-1.35.0-4.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.x86_64",
"SUSE OpenStack Cloud 9:busybox-1.35.0-4.3.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:busybox-1.35.0-4.3.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-42385",
"url": "https://www.suse.com/security/cve/CVE-2021-42385"
},
{
"category": "external",
"summary": "SUSE Bug 1192869 for CVE-2021-42385",
"url": "https://bugzilla.suse.com/1192869"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP2-BCL:busybox-1.35.0-4.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:busybox-1.35.0-4.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:busybox-1.35.0-4.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:busybox-1.35.0-4.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.x86_64",
"SUSE OpenStack Cloud 9:busybox-1.35.0-4.3.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:busybox-1.35.0-4.3.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.6,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP2-BCL:busybox-1.35.0-4.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:busybox-1.35.0-4.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:busybox-1.35.0-4.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:busybox-1.35.0-4.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.x86_64",
"SUSE OpenStack Cloud 9:busybox-1.35.0-4.3.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:busybox-1.35.0-4.3.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-11-28T10:23:47Z",
"details": "moderate"
}
],
"title": "CVE-2021-42385"
},
{
"cve": "CVE-2021-42386",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-42386"
}
],
"notes": [
{
"category": "general",
"text": "A use-after-free in Busybox\u0027s awk applet leads to denial of service and possibly code execution when processing a crafted awk pattern in the nvalloc function",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP2-BCL:busybox-1.35.0-4.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:busybox-1.35.0-4.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:busybox-1.35.0-4.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:busybox-1.35.0-4.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.x86_64",
"SUSE OpenStack Cloud 9:busybox-1.35.0-4.3.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:busybox-1.35.0-4.3.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-42386",
"url": "https://www.suse.com/security/cve/CVE-2021-42386"
},
{
"category": "external",
"summary": "SUSE Bug 1192869 for CVE-2021-42386",
"url": "https://bugzilla.suse.com/1192869"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP2-BCL:busybox-1.35.0-4.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:busybox-1.35.0-4.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:busybox-1.35.0-4.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:busybox-1.35.0-4.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.x86_64",
"SUSE OpenStack Cloud 9:busybox-1.35.0-4.3.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:busybox-1.35.0-4.3.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.6,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP2-BCL:busybox-1.35.0-4.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:busybox-1.35.0-4.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:busybox-1.35.0-4.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:busybox-1.35.0-4.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:busybox-1.35.0-4.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:busybox-1.35.0-4.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:busybox-1.35.0-4.3.1.x86_64",
"SUSE OpenStack Cloud 9:busybox-1.35.0-4.3.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:busybox-1.35.0-4.3.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-11-28T10:23:47Z",
"details": "moderate"
}
],
"title": "CVE-2021-42386"
}
]
}
SUSE-SU-2022:3959-1
Vulnerability from csaf_suse - Published: 2022-11-11 14:38 - Updated: 2022-11-11 14:38Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for busybox",
"title": "Title of the patch"
},
{
"category": "description",
"text": "This update for busybox fixes the following issues:\n\n- Enable switch_root\n With this change virtme --force-initramfs works as expected.\n- Enable udhcpc\n\nbusybox was updated to 1.35.0\n\n- Adjust busybox.config for new features in find, date and cpio \n\n- Annotate CVEs already fixed in upstream, but not mentioned in .changes yet:\n\n* CVE-2017-16544 (bsc#1069412): Insufficient sanitization of filenames when autocompleting\n* CVE-2015-9261 (bsc#1102912): huft_build misuses a pointer, causing segfaults\n* CVE-2016-2147 (bsc#970663): out of bounds write (heap) due to integer underflow in udhcpc\n* CVE-2016-2148 (bsc#970662): heap-based buffer overflow in OPTION_6RD parsing\n* CVE-2016-6301 (bsc#991940): NTP server denial of service flaw\n* CVE-2017-15873 (bsc#1064976): The get_next_block function in archival/libarchive/decompress_bunzip2.c has an Integer Overflow\n* CVE-2017-15874 (bsc#1064978): archival/libarchive/decompress_unlzma.c has an Integer Underflow\n* CVE-2019-5747 (bsc#1121428): out of bounds read in udhcp components\n* CVE-2021-42373, CVE-2021-42374, CVE-2021-42375, CVE-2021-42376,\n CVE-2021-42377, CVE-2021-42378, CVE-2021-42379, CVE-2021-42380,\n CVE-2021-42381, CVE-2021-42382, CVE-2021-42383, CVE-2021-42384,\n CVE-2021-42385, CVE-2021-42386 (bsc#1192869) : v1.34.0 bugfixes\n* CVE-2021-28831 (bsc#1184522): invalid free or segmentation fault via malformed gzip data\n* CVE-2018-20679 (bsc#1121426): out of bounds read in udhcp\n* CVE-2018-1000517 (bsc#1099260): Heap-based buffer overflow in the retrieve_file_data()\n* CVE-2011-5325 (bsc#951562): tar directory traversal\n* CVE-2018-1000500 (bsc#1099263): wget: Missing SSL certificate validation\n",
"title": "Description of the patch"
},
{
"category": "details",
"text": "SUSE-2022-3959,SUSE-SLE-Module-Basesystem-15-SP4-2022-3959,openSUSE-SLE-15.4-2022-3959",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2022_3959-1.json"
},
{
"category": "self",
"summary": "URL for SUSE-SU-2022:3959-1",
"url": "https://www.suse.com/support/update/announcement/2022/suse-su-20223959-1/"
},
{
"category": "self",
"summary": "E-Mail link for SUSE-SU-2022:3959-1",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2022-November/012904.html"
},
{
"category": "self",
"summary": "SUSE Bug 1064976",
"url": "https://bugzilla.suse.com/1064976"
},
{
"category": "self",
"summary": "SUSE Bug 1064978",
"url": "https://bugzilla.suse.com/1064978"
},
{
"category": "self",
"summary": "SUSE Bug 1069412",
"url": "https://bugzilla.suse.com/1069412"
},
{
"category": "self",
"summary": "SUSE Bug 1099260",
"url": "https://bugzilla.suse.com/1099260"
},
{
"category": "self",
"summary": "SUSE Bug 1099263",
"url": "https://bugzilla.suse.com/1099263"
},
{
"category": "self",
"summary": "SUSE Bug 1102912",
"url": "https://bugzilla.suse.com/1102912"
},
{
"category": "self",
"summary": "SUSE Bug 1121426",
"url": "https://bugzilla.suse.com/1121426"
},
{
"category": "self",
"summary": "SUSE Bug 1121428",
"url": "https://bugzilla.suse.com/1121428"
},
{
"category": "self",
"summary": "SUSE Bug 1184522",
"url": "https://bugzilla.suse.com/1184522"
},
{
"category": "self",
"summary": "SUSE Bug 1192869",
"url": "https://bugzilla.suse.com/1192869"
},
{
"category": "self",
"summary": "SUSE Bug 951562",
"url": "https://bugzilla.suse.com/951562"
},
{
"category": "self",
"summary": "SUSE Bug 970662",
"url": "https://bugzilla.suse.com/970662"
},
{
"category": "self",
"summary": "SUSE Bug 970663",
"url": "https://bugzilla.suse.com/970663"
},
{
"category": "self",
"summary": "SUSE Bug 991940",
"url": "https://bugzilla.suse.com/991940"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2011-5325 page",
"url": "https://www.suse.com/security/cve/CVE-2011-5325/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2015-9261 page",
"url": "https://www.suse.com/security/cve/CVE-2015-9261/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2016-2147 page",
"url": "https://www.suse.com/security/cve/CVE-2016-2147/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2016-2148 page",
"url": "https://www.suse.com/security/cve/CVE-2016-2148/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2016-6301 page",
"url": "https://www.suse.com/security/cve/CVE-2016-6301/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-15873 page",
"url": "https://www.suse.com/security/cve/CVE-2017-15873/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-15874 page",
"url": "https://www.suse.com/security/cve/CVE-2017-15874/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-16544 page",
"url": "https://www.suse.com/security/cve/CVE-2017-16544/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2018-1000500 page",
"url": "https://www.suse.com/security/cve/CVE-2018-1000500/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2018-1000517 page",
"url": "https://www.suse.com/security/cve/CVE-2018-1000517/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2018-20679 page",
"url": "https://www.suse.com/security/cve/CVE-2018-20679/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-5747 page",
"url": "https://www.suse.com/security/cve/CVE-2019-5747/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-28831 page",
"url": "https://www.suse.com/security/cve/CVE-2021-28831/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-42373 page",
"url": "https://www.suse.com/security/cve/CVE-2021-42373/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-42374 page",
"url": "https://www.suse.com/security/cve/CVE-2021-42374/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-42375 page",
"url": "https://www.suse.com/security/cve/CVE-2021-42375/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-42376 page",
"url": "https://www.suse.com/security/cve/CVE-2021-42376/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-42377 page",
"url": "https://www.suse.com/security/cve/CVE-2021-42377/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-42378 page",
"url": "https://www.suse.com/security/cve/CVE-2021-42378/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-42379 page",
"url": "https://www.suse.com/security/cve/CVE-2021-42379/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-42380 page",
"url": "https://www.suse.com/security/cve/CVE-2021-42380/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-42381 page",
"url": "https://www.suse.com/security/cve/CVE-2021-42381/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-42382 page",
"url": "https://www.suse.com/security/cve/CVE-2021-42382/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-42383 page",
"url": "https://www.suse.com/security/cve/CVE-2021-42383/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-42384 page",
"url": "https://www.suse.com/security/cve/CVE-2021-42384/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-42385 page",
"url": "https://www.suse.com/security/cve/CVE-2021-42385/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-42386 page",
"url": "https://www.suse.com/security/cve/CVE-2021-42386/"
}
],
"title": "Security update for busybox",
"tracking": {
"current_release_date": "2022-11-11T14:38:22Z",
"generator": {
"date": "2022-11-11T14:38:22Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "SUSE-SU-2022:3959-1",
"initial_release_date": "2022-11-11T14:38:22Z",
"revision_history": [
{
"date": "2022-11-11T14:38:22Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "busybox-1.35.0-150400.3.3.1.aarch64",
"product": {
"name": "busybox-1.35.0-150400.3.3.1.aarch64",
"product_id": "busybox-1.35.0-150400.3.3.1.aarch64"
}
},
{
"category": "product_version",
"name": "busybox-static-1.35.0-150400.3.3.1.aarch64",
"product": {
"name": "busybox-static-1.35.0-150400.3.3.1.aarch64",
"product_id": "busybox-static-1.35.0-150400.3.3.1.aarch64"
}
},
{
"category": "product_version",
"name": "busybox-testsuite-1.35.0-150400.3.3.1.aarch64",
"product": {
"name": "busybox-testsuite-1.35.0-150400.3.3.1.aarch64",
"product_id": "busybox-testsuite-1.35.0-150400.3.3.1.aarch64"
}
},
{
"category": "product_version",
"name": "busybox-warewulf3-1.35.0-150400.3.3.1.aarch64",
"product": {
"name": "busybox-warewulf3-1.35.0-150400.3.3.1.aarch64",
"product_id": "busybox-warewulf3-1.35.0-150400.3.3.1.aarch64"
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "busybox-1.35.0-150400.3.3.1.i586",
"product": {
"name": "busybox-1.35.0-150400.3.3.1.i586",
"product_id": "busybox-1.35.0-150400.3.3.1.i586"
}
},
{
"category": "product_version",
"name": "busybox-static-1.35.0-150400.3.3.1.i586",
"product": {
"name": "busybox-static-1.35.0-150400.3.3.1.i586",
"product_id": "busybox-static-1.35.0-150400.3.3.1.i586"
}
},
{
"category": "product_version",
"name": "busybox-testsuite-1.35.0-150400.3.3.1.i586",
"product": {
"name": "busybox-testsuite-1.35.0-150400.3.3.1.i586",
"product_id": "busybox-testsuite-1.35.0-150400.3.3.1.i586"
}
},
{
"category": "product_version",
"name": "busybox-warewulf3-1.35.0-150400.3.3.1.i586",
"product": {
"name": "busybox-warewulf3-1.35.0-150400.3.3.1.i586",
"product_id": "busybox-warewulf3-1.35.0-150400.3.3.1.i586"
}
}
],
"category": "architecture",
"name": "i586"
},
{
"branches": [
{
"category": "product_version",
"name": "busybox-1.35.0-150400.3.3.1.ppc64le",
"product": {
"name": "busybox-1.35.0-150400.3.3.1.ppc64le",
"product_id": "busybox-1.35.0-150400.3.3.1.ppc64le"
}
},
{
"category": "product_version",
"name": "busybox-static-1.35.0-150400.3.3.1.ppc64le",
"product": {
"name": "busybox-static-1.35.0-150400.3.3.1.ppc64le",
"product_id": "busybox-static-1.35.0-150400.3.3.1.ppc64le"
}
},
{
"category": "product_version",
"name": "busybox-testsuite-1.35.0-150400.3.3.1.ppc64le",
"product": {
"name": "busybox-testsuite-1.35.0-150400.3.3.1.ppc64le",
"product_id": "busybox-testsuite-1.35.0-150400.3.3.1.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "busybox-1.35.0-150400.3.3.1.s390x",
"product": {
"name": "busybox-1.35.0-150400.3.3.1.s390x",
"product_id": "busybox-1.35.0-150400.3.3.1.s390x"
}
},
{
"category": "product_version",
"name": "busybox-static-1.35.0-150400.3.3.1.s390x",
"product": {
"name": "busybox-static-1.35.0-150400.3.3.1.s390x",
"product_id": "busybox-static-1.35.0-150400.3.3.1.s390x"
}
},
{
"category": "product_version",
"name": "busybox-testsuite-1.35.0-150400.3.3.1.s390x",
"product": {
"name": "busybox-testsuite-1.35.0-150400.3.3.1.s390x",
"product_id": "busybox-testsuite-1.35.0-150400.3.3.1.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "busybox-1.35.0-150400.3.3.1.x86_64",
"product": {
"name": "busybox-1.35.0-150400.3.3.1.x86_64",
"product_id": "busybox-1.35.0-150400.3.3.1.x86_64"
}
},
{
"category": "product_version",
"name": "busybox-static-1.35.0-150400.3.3.1.x86_64",
"product": {
"name": "busybox-static-1.35.0-150400.3.3.1.x86_64",
"product_id": "busybox-static-1.35.0-150400.3.3.1.x86_64"
}
},
{
"category": "product_version",
"name": "busybox-testsuite-1.35.0-150400.3.3.1.x86_64",
"product": {
"name": "busybox-testsuite-1.35.0-150400.3.3.1.x86_64",
"product_id": "busybox-testsuite-1.35.0-150400.3.3.1.x86_64"
}
},
{
"category": "product_version",
"name": "busybox-warewulf3-1.35.0-150400.3.3.1.x86_64",
"product": {
"name": "busybox-warewulf3-1.35.0-150400.3.3.1.x86_64",
"product_id": "busybox-warewulf3-1.35.0-150400.3.3.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux Enterprise Module for Basesystem 15 SP4",
"product": {
"name": "SUSE Linux Enterprise Module for Basesystem 15 SP4",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP4",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-module-basesystem:15:sp4"
}
}
},
{
"category": "product_name",
"name": "openSUSE Leap 15.4",
"product": {
"name": "openSUSE Leap 15.4",
"product_id": "openSUSE Leap 15.4",
"product_identification_helper": {
"cpe": "cpe:/o:opensuse:leap:15.4"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "busybox-1.35.0-150400.3.3.1.aarch64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP4",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.aarch64"
},
"product_reference": "busybox-1.35.0-150400.3.3.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "busybox-1.35.0-150400.3.3.1.ppc64le as component of SUSE Linux Enterprise Module for Basesystem 15 SP4",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.ppc64le"
},
"product_reference": "busybox-1.35.0-150400.3.3.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "busybox-1.35.0-150400.3.3.1.s390x as component of SUSE Linux Enterprise Module for Basesystem 15 SP4",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.s390x"
},
"product_reference": "busybox-1.35.0-150400.3.3.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "busybox-1.35.0-150400.3.3.1.x86_64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP4",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.x86_64"
},
"product_reference": "busybox-1.35.0-150400.3.3.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "busybox-static-1.35.0-150400.3.3.1.aarch64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP4",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.aarch64"
},
"product_reference": "busybox-static-1.35.0-150400.3.3.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "busybox-static-1.35.0-150400.3.3.1.ppc64le as component of SUSE Linux Enterprise Module for Basesystem 15 SP4",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.ppc64le"
},
"product_reference": "busybox-static-1.35.0-150400.3.3.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "busybox-static-1.35.0-150400.3.3.1.s390x as component of SUSE Linux Enterprise Module for Basesystem 15 SP4",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.s390x"
},
"product_reference": "busybox-static-1.35.0-150400.3.3.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "busybox-static-1.35.0-150400.3.3.1.x86_64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP4",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.x86_64"
},
"product_reference": "busybox-static-1.35.0-150400.3.3.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "busybox-1.35.0-150400.3.3.1.aarch64 as component of openSUSE Leap 15.4",
"product_id": "openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.aarch64"
},
"product_reference": "busybox-1.35.0-150400.3.3.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "busybox-1.35.0-150400.3.3.1.ppc64le as component of openSUSE Leap 15.4",
"product_id": "openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.ppc64le"
},
"product_reference": "busybox-1.35.0-150400.3.3.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "busybox-1.35.0-150400.3.3.1.s390x as component of openSUSE Leap 15.4",
"product_id": "openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.s390x"
},
"product_reference": "busybox-1.35.0-150400.3.3.1.s390x",
"relates_to_product_reference": "openSUSE Leap 15.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "busybox-1.35.0-150400.3.3.1.x86_64 as component of openSUSE Leap 15.4",
"product_id": "openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.x86_64"
},
"product_reference": "busybox-1.35.0-150400.3.3.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "busybox-static-1.35.0-150400.3.3.1.aarch64 as component of openSUSE Leap 15.4",
"product_id": "openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.aarch64"
},
"product_reference": "busybox-static-1.35.0-150400.3.3.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "busybox-static-1.35.0-150400.3.3.1.ppc64le as component of openSUSE Leap 15.4",
"product_id": "openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.ppc64le"
},
"product_reference": "busybox-static-1.35.0-150400.3.3.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "busybox-static-1.35.0-150400.3.3.1.s390x as component of openSUSE Leap 15.4",
"product_id": "openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.s390x"
},
"product_reference": "busybox-static-1.35.0-150400.3.3.1.s390x",
"relates_to_product_reference": "openSUSE Leap 15.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "busybox-static-1.35.0-150400.3.3.1.x86_64 as component of openSUSE Leap 15.4",
"product_id": "openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.x86_64"
},
"product_reference": "busybox-static-1.35.0-150400.3.3.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "busybox-testsuite-1.35.0-150400.3.3.1.aarch64 as component of openSUSE Leap 15.4",
"product_id": "openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.aarch64"
},
"product_reference": "busybox-testsuite-1.35.0-150400.3.3.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "busybox-testsuite-1.35.0-150400.3.3.1.ppc64le as component of openSUSE Leap 15.4",
"product_id": "openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.ppc64le"
},
"product_reference": "busybox-testsuite-1.35.0-150400.3.3.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "busybox-testsuite-1.35.0-150400.3.3.1.s390x as component of openSUSE Leap 15.4",
"product_id": "openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.s390x"
},
"product_reference": "busybox-testsuite-1.35.0-150400.3.3.1.s390x",
"relates_to_product_reference": "openSUSE Leap 15.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "busybox-testsuite-1.35.0-150400.3.3.1.x86_64 as component of openSUSE Leap 15.4",
"product_id": "openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.x86_64"
},
"product_reference": "busybox-testsuite-1.35.0-150400.3.3.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "busybox-warewulf3-1.35.0-150400.3.3.1.aarch64 as component of openSUSE Leap 15.4",
"product_id": "openSUSE Leap 15.4:busybox-warewulf3-1.35.0-150400.3.3.1.aarch64"
},
"product_reference": "busybox-warewulf3-1.35.0-150400.3.3.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "busybox-warewulf3-1.35.0-150400.3.3.1.x86_64 as component of openSUSE Leap 15.4",
"product_id": "openSUSE Leap 15.4:busybox-warewulf3-1.35.0-150400.3.3.1.x86_64"
},
"product_reference": "busybox-warewulf3-1.35.0-150400.3.3.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.4"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2011-5325",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2011-5325"
}
],
"notes": [
{
"category": "general",
"text": "Directory traversal vulnerability in the BusyBox implementation of tar before 1.22.0 v5 allows remote attackers to point to files outside the current working directory via a symlink.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.x86_64",
"openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.aarch64",
"openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.ppc64le",
"openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.s390x",
"openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.x86_64",
"openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.aarch64",
"openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.ppc64le",
"openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.s390x",
"openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.x86_64",
"openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.aarch64",
"openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.ppc64le",
"openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.s390x",
"openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.x86_64",
"openSUSE Leap 15.4:busybox-warewulf3-1.35.0-150400.3.3.1.aarch64",
"openSUSE Leap 15.4:busybox-warewulf3-1.35.0-150400.3.3.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2011-5325",
"url": "https://www.suse.com/security/cve/CVE-2011-5325"
},
{
"category": "external",
"summary": "SUSE Bug 951562 for CVE-2011-5325",
"url": "https://bugzilla.suse.com/951562"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.x86_64",
"openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.aarch64",
"openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.ppc64le",
"openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.s390x",
"openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.x86_64",
"openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.aarch64",
"openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.ppc64le",
"openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.s390x",
"openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.x86_64",
"openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.aarch64",
"openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.ppc64le",
"openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.s390x",
"openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.x86_64",
"openSUSE Leap 15.4:busybox-warewulf3-1.35.0-150400.3.3.1.aarch64",
"openSUSE Leap 15.4:busybox-warewulf3-1.35.0-150400.3.3.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.x86_64",
"openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.aarch64",
"openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.ppc64le",
"openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.s390x",
"openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.x86_64",
"openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.aarch64",
"openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.ppc64le",
"openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.s390x",
"openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.x86_64",
"openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.aarch64",
"openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.ppc64le",
"openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.s390x",
"openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.x86_64",
"openSUSE Leap 15.4:busybox-warewulf3-1.35.0-150400.3.3.1.aarch64",
"openSUSE Leap 15.4:busybox-warewulf3-1.35.0-150400.3.3.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-11-11T14:38:22Z",
"details": "moderate"
}
],
"title": "CVE-2011-5325"
},
{
"cve": "CVE-2015-9261",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2015-9261"
}
],
"notes": [
{
"category": "general",
"text": "huft_build in archival/libarchive/decompress_gunzip.c in BusyBox before 1.27.2 misuses a pointer, causing segfaults and an application crash during an unzip operation on a specially crafted ZIP file.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.x86_64",
"openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.aarch64",
"openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.ppc64le",
"openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.s390x",
"openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.x86_64",
"openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.aarch64",
"openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.ppc64le",
"openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.s390x",
"openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.x86_64",
"openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.aarch64",
"openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.ppc64le",
"openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.s390x",
"openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.x86_64",
"openSUSE Leap 15.4:busybox-warewulf3-1.35.0-150400.3.3.1.aarch64",
"openSUSE Leap 15.4:busybox-warewulf3-1.35.0-150400.3.3.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2015-9261",
"url": "https://www.suse.com/security/cve/CVE-2015-9261"
},
{
"category": "external",
"summary": "SUSE Bug 1102912 for CVE-2015-9261",
"url": "https://bugzilla.suse.com/1102912"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.x86_64",
"openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.aarch64",
"openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.ppc64le",
"openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.s390x",
"openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.x86_64",
"openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.aarch64",
"openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.ppc64le",
"openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.s390x",
"openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.x86_64",
"openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.aarch64",
"openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.ppc64le",
"openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.s390x",
"openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.x86_64",
"openSUSE Leap 15.4:busybox-warewulf3-1.35.0-150400.3.3.1.aarch64",
"openSUSE Leap 15.4:busybox-warewulf3-1.35.0-150400.3.3.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.x86_64",
"openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.aarch64",
"openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.ppc64le",
"openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.s390x",
"openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.x86_64",
"openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.aarch64",
"openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.ppc64le",
"openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.s390x",
"openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.x86_64",
"openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.aarch64",
"openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.ppc64le",
"openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.s390x",
"openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.x86_64",
"openSUSE Leap 15.4:busybox-warewulf3-1.35.0-150400.3.3.1.aarch64",
"openSUSE Leap 15.4:busybox-warewulf3-1.35.0-150400.3.3.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-11-11T14:38:22Z",
"details": "low"
}
],
"title": "CVE-2015-9261"
},
{
"cve": "CVE-2016-2147",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2016-2147"
}
],
"notes": [
{
"category": "general",
"text": "Integer overflow in the DHCP client (udhcpc) in BusyBox before 1.25.0 allows remote attackers to cause a denial of service (crash) via a malformed RFC1035-encoded domain name, which triggers an out-of-bounds heap write.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.x86_64",
"openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.aarch64",
"openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.ppc64le",
"openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.s390x",
"openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.x86_64",
"openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.aarch64",
"openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.ppc64le",
"openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.s390x",
"openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.x86_64",
"openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.aarch64",
"openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.ppc64le",
"openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.s390x",
"openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.x86_64",
"openSUSE Leap 15.4:busybox-warewulf3-1.35.0-150400.3.3.1.aarch64",
"openSUSE Leap 15.4:busybox-warewulf3-1.35.0-150400.3.3.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2016-2147",
"url": "https://www.suse.com/security/cve/CVE-2016-2147"
},
{
"category": "external",
"summary": "SUSE Bug 970663 for CVE-2016-2147",
"url": "https://bugzilla.suse.com/970663"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.x86_64",
"openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.aarch64",
"openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.ppc64le",
"openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.s390x",
"openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.x86_64",
"openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.aarch64",
"openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.ppc64le",
"openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.s390x",
"openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.x86_64",
"openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.aarch64",
"openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.ppc64le",
"openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.s390x",
"openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.x86_64",
"openSUSE Leap 15.4:busybox-warewulf3-1.35.0-150400.3.3.1.aarch64",
"openSUSE Leap 15.4:busybox-warewulf3-1.35.0-150400.3.3.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.x86_64",
"openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.aarch64",
"openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.ppc64le",
"openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.s390x",
"openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.x86_64",
"openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.aarch64",
"openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.ppc64le",
"openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.s390x",
"openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.x86_64",
"openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.aarch64",
"openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.ppc64le",
"openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.s390x",
"openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.x86_64",
"openSUSE Leap 15.4:busybox-warewulf3-1.35.0-150400.3.3.1.aarch64",
"openSUSE Leap 15.4:busybox-warewulf3-1.35.0-150400.3.3.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-11-11T14:38:22Z",
"details": "important"
}
],
"title": "CVE-2016-2147"
},
{
"cve": "CVE-2016-2148",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2016-2148"
}
],
"notes": [
{
"category": "general",
"text": "Heap-based buffer overflow in the DHCP client (udhcpc) in BusyBox before 1.25.0 allows remote attackers to have unspecified impact via vectors involving OPTION_6RD parsing.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.x86_64",
"openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.aarch64",
"openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.ppc64le",
"openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.s390x",
"openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.x86_64",
"openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.aarch64",
"openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.ppc64le",
"openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.s390x",
"openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.x86_64",
"openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.aarch64",
"openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.ppc64le",
"openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.s390x",
"openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.x86_64",
"openSUSE Leap 15.4:busybox-warewulf3-1.35.0-150400.3.3.1.aarch64",
"openSUSE Leap 15.4:busybox-warewulf3-1.35.0-150400.3.3.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2016-2148",
"url": "https://www.suse.com/security/cve/CVE-2016-2148"
},
{
"category": "external",
"summary": "SUSE Bug 970662 for CVE-2016-2148",
"url": "https://bugzilla.suse.com/970662"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.x86_64",
"openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.aarch64",
"openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.ppc64le",
"openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.s390x",
"openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.x86_64",
"openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.aarch64",
"openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.ppc64le",
"openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.s390x",
"openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.x86_64",
"openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.aarch64",
"openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.ppc64le",
"openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.s390x",
"openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.x86_64",
"openSUSE Leap 15.4:busybox-warewulf3-1.35.0-150400.3.3.1.aarch64",
"openSUSE Leap 15.4:busybox-warewulf3-1.35.0-150400.3.3.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.x86_64",
"openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.aarch64",
"openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.ppc64le",
"openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.s390x",
"openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.x86_64",
"openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.aarch64",
"openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.ppc64le",
"openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.s390x",
"openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.x86_64",
"openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.aarch64",
"openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.ppc64le",
"openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.s390x",
"openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.x86_64",
"openSUSE Leap 15.4:busybox-warewulf3-1.35.0-150400.3.3.1.aarch64",
"openSUSE Leap 15.4:busybox-warewulf3-1.35.0-150400.3.3.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-11-11T14:38:22Z",
"details": "moderate"
}
],
"title": "CVE-2016-2148"
},
{
"cve": "CVE-2016-6301",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2016-6301"
}
],
"notes": [
{
"category": "general",
"text": "The recv_and_process_client_pkt function in networking/ntpd.c in busybox allows remote attackers to cause a denial of service (CPU and bandwidth consumption) via a forged NTP packet, which triggers a communication loop.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.x86_64",
"openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.aarch64",
"openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.ppc64le",
"openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.s390x",
"openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.x86_64",
"openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.aarch64",
"openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.ppc64le",
"openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.s390x",
"openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.x86_64",
"openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.aarch64",
"openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.ppc64le",
"openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.s390x",
"openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.x86_64",
"openSUSE Leap 15.4:busybox-warewulf3-1.35.0-150400.3.3.1.aarch64",
"openSUSE Leap 15.4:busybox-warewulf3-1.35.0-150400.3.3.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2016-6301",
"url": "https://www.suse.com/security/cve/CVE-2016-6301"
},
{
"category": "external",
"summary": "SUSE Bug 991940 for CVE-2016-6301",
"url": "https://bugzilla.suse.com/991940"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.x86_64",
"openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.aarch64",
"openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.ppc64le",
"openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.s390x",
"openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.x86_64",
"openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.aarch64",
"openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.ppc64le",
"openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.s390x",
"openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.x86_64",
"openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.aarch64",
"openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.ppc64le",
"openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.s390x",
"openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.x86_64",
"openSUSE Leap 15.4:busybox-warewulf3-1.35.0-150400.3.3.1.aarch64",
"openSUSE Leap 15.4:busybox-warewulf3-1.35.0-150400.3.3.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.x86_64",
"openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.aarch64",
"openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.ppc64le",
"openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.s390x",
"openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.x86_64",
"openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.aarch64",
"openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.ppc64le",
"openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.s390x",
"openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.x86_64",
"openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.aarch64",
"openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.ppc64le",
"openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.s390x",
"openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.x86_64",
"openSUSE Leap 15.4:busybox-warewulf3-1.35.0-150400.3.3.1.aarch64",
"openSUSE Leap 15.4:busybox-warewulf3-1.35.0-150400.3.3.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-11-11T14:38:22Z",
"details": "moderate"
}
],
"title": "CVE-2016-6301"
},
{
"cve": "CVE-2017-15873",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-15873"
}
],
"notes": [
{
"category": "general",
"text": "The get_next_block function in archival/libarchive/decompress_bunzip2.c in BusyBox 1.27.2 has an Integer Overflow that may lead to a write access violation.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.x86_64",
"openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.aarch64",
"openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.ppc64le",
"openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.s390x",
"openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.x86_64",
"openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.aarch64",
"openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.ppc64le",
"openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.s390x",
"openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.x86_64",
"openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.aarch64",
"openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.ppc64le",
"openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.s390x",
"openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.x86_64",
"openSUSE Leap 15.4:busybox-warewulf3-1.35.0-150400.3.3.1.aarch64",
"openSUSE Leap 15.4:busybox-warewulf3-1.35.0-150400.3.3.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-15873",
"url": "https://www.suse.com/security/cve/CVE-2017-15873"
},
{
"category": "external",
"summary": "SUSE Bug 1064976 for CVE-2017-15873",
"url": "https://bugzilla.suse.com/1064976"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.x86_64",
"openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.aarch64",
"openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.ppc64le",
"openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.s390x",
"openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.x86_64",
"openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.aarch64",
"openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.ppc64le",
"openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.s390x",
"openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.x86_64",
"openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.aarch64",
"openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.ppc64le",
"openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.s390x",
"openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.x86_64",
"openSUSE Leap 15.4:busybox-warewulf3-1.35.0-150400.3.3.1.aarch64",
"openSUSE Leap 15.4:busybox-warewulf3-1.35.0-150400.3.3.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.x86_64",
"openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.aarch64",
"openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.ppc64le",
"openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.s390x",
"openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.x86_64",
"openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.aarch64",
"openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.ppc64le",
"openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.s390x",
"openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.x86_64",
"openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.aarch64",
"openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.ppc64le",
"openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.s390x",
"openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.x86_64",
"openSUSE Leap 15.4:busybox-warewulf3-1.35.0-150400.3.3.1.aarch64",
"openSUSE Leap 15.4:busybox-warewulf3-1.35.0-150400.3.3.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-11-11T14:38:22Z",
"details": "moderate"
}
],
"title": "CVE-2017-15873"
},
{
"cve": "CVE-2017-15874",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-15874"
}
],
"notes": [
{
"category": "general",
"text": "archival/libarchive/decompress_unlzma.c in BusyBox 1.27.2 has an Integer Underflow that leads to a read access violation.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.x86_64",
"openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.aarch64",
"openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.ppc64le",
"openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.s390x",
"openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.x86_64",
"openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.aarch64",
"openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.ppc64le",
"openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.s390x",
"openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.x86_64",
"openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.aarch64",
"openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.ppc64le",
"openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.s390x",
"openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.x86_64",
"openSUSE Leap 15.4:busybox-warewulf3-1.35.0-150400.3.3.1.aarch64",
"openSUSE Leap 15.4:busybox-warewulf3-1.35.0-150400.3.3.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-15874",
"url": "https://www.suse.com/security/cve/CVE-2017-15874"
},
{
"category": "external",
"summary": "SUSE Bug 1064978 for CVE-2017-15874",
"url": "https://bugzilla.suse.com/1064978"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.x86_64",
"openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.aarch64",
"openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.ppc64le",
"openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.s390x",
"openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.x86_64",
"openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.aarch64",
"openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.ppc64le",
"openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.s390x",
"openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.x86_64",
"openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.aarch64",
"openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.ppc64le",
"openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.s390x",
"openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.x86_64",
"openSUSE Leap 15.4:busybox-warewulf3-1.35.0-150400.3.3.1.aarch64",
"openSUSE Leap 15.4:busybox-warewulf3-1.35.0-150400.3.3.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.3,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.x86_64",
"openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.aarch64",
"openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.ppc64le",
"openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.s390x",
"openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.x86_64",
"openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.aarch64",
"openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.ppc64le",
"openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.s390x",
"openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.x86_64",
"openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.aarch64",
"openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.ppc64le",
"openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.s390x",
"openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.x86_64",
"openSUSE Leap 15.4:busybox-warewulf3-1.35.0-150400.3.3.1.aarch64",
"openSUSE Leap 15.4:busybox-warewulf3-1.35.0-150400.3.3.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-11-11T14:38:22Z",
"details": "low"
}
],
"title": "CVE-2017-15874"
},
{
"cve": "CVE-2017-16544",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-16544"
}
],
"notes": [
{
"category": "general",
"text": "In the add_match function in libbb/lineedit.c in BusyBox through 1.27.2, the tab autocomplete feature of the shell, used to get a list of filenames in a directory, does not sanitize filenames and results in executing any escape sequence in the terminal. This could potentially result in code execution, arbitrary file writes, or other attacks.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.x86_64",
"openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.aarch64",
"openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.ppc64le",
"openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.s390x",
"openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.x86_64",
"openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.aarch64",
"openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.ppc64le",
"openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.s390x",
"openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.x86_64",
"openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.aarch64",
"openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.ppc64le",
"openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.s390x",
"openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.x86_64",
"openSUSE Leap 15.4:busybox-warewulf3-1.35.0-150400.3.3.1.aarch64",
"openSUSE Leap 15.4:busybox-warewulf3-1.35.0-150400.3.3.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-16544",
"url": "https://www.suse.com/security/cve/CVE-2017-16544"
},
{
"category": "external",
"summary": "SUSE Bug 1069412 for CVE-2017-16544",
"url": "https://bugzilla.suse.com/1069412"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.x86_64",
"openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.aarch64",
"openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.ppc64le",
"openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.s390x",
"openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.x86_64",
"openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.aarch64",
"openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.ppc64le",
"openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.s390x",
"openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.x86_64",
"openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.aarch64",
"openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.ppc64le",
"openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.s390x",
"openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.x86_64",
"openSUSE Leap 15.4:busybox-warewulf3-1.35.0-150400.3.3.1.aarch64",
"openSUSE Leap 15.4:busybox-warewulf3-1.35.0-150400.3.3.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.x86_64",
"openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.aarch64",
"openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.ppc64le",
"openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.s390x",
"openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.x86_64",
"openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.aarch64",
"openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.ppc64le",
"openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.s390x",
"openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.x86_64",
"openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.aarch64",
"openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.ppc64le",
"openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.s390x",
"openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.x86_64",
"openSUSE Leap 15.4:busybox-warewulf3-1.35.0-150400.3.3.1.aarch64",
"openSUSE Leap 15.4:busybox-warewulf3-1.35.0-150400.3.3.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-11-11T14:38:22Z",
"details": "moderate"
}
],
"title": "CVE-2017-16544"
},
{
"cve": "CVE-2018-1000500",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2018-1000500"
}
],
"notes": [
{
"category": "general",
"text": "Busybox contains a Missing SSL certificate validation vulnerability in The \"busybox wget\" applet that can result in arbitrary code execution. This attack appear to be exploitable via Simply download any file over HTTPS using \"busybox wget https://compromised-domain.com/important-file\".",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.x86_64",
"openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.aarch64",
"openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.ppc64le",
"openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.s390x",
"openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.x86_64",
"openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.aarch64",
"openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.ppc64le",
"openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.s390x",
"openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.x86_64",
"openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.aarch64",
"openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.ppc64le",
"openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.s390x",
"openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.x86_64",
"openSUSE Leap 15.4:busybox-warewulf3-1.35.0-150400.3.3.1.aarch64",
"openSUSE Leap 15.4:busybox-warewulf3-1.35.0-150400.3.3.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2018-1000500",
"url": "https://www.suse.com/security/cve/CVE-2018-1000500"
},
{
"category": "external",
"summary": "SUSE Bug 1099263 for CVE-2018-1000500",
"url": "https://bugzilla.suse.com/1099263"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.x86_64",
"openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.aarch64",
"openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.ppc64le",
"openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.s390x",
"openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.x86_64",
"openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.aarch64",
"openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.ppc64le",
"openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.s390x",
"openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.x86_64",
"openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.aarch64",
"openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.ppc64le",
"openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.s390x",
"openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.x86_64",
"openSUSE Leap 15.4:busybox-warewulf3-1.35.0-150400.3.3.1.aarch64",
"openSUSE Leap 15.4:busybox-warewulf3-1.35.0-150400.3.3.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.x86_64",
"openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.aarch64",
"openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.ppc64le",
"openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.s390x",
"openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.x86_64",
"openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.aarch64",
"openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.ppc64le",
"openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.s390x",
"openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.x86_64",
"openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.aarch64",
"openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.ppc64le",
"openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.s390x",
"openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.x86_64",
"openSUSE Leap 15.4:busybox-warewulf3-1.35.0-150400.3.3.1.aarch64",
"openSUSE Leap 15.4:busybox-warewulf3-1.35.0-150400.3.3.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-11-11T14:38:22Z",
"details": "important"
}
],
"title": "CVE-2018-1000500"
},
{
"cve": "CVE-2018-1000517",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2018-1000517"
}
],
"notes": [
{
"category": "general",
"text": "BusyBox project BusyBox wget version prior to commit 8e2174e9bd836e53c8b9c6e00d1bc6e2a718686e contains a Buffer Overflow vulnerability in Busybox wget that can result in heap buffer overflow. This attack appear to be exploitable via network connectivity. This vulnerability appears to have been fixed in after commit 8e2174e9bd836e53c8b9c6e00d1bc6e2a718686e.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.x86_64",
"openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.aarch64",
"openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.ppc64le",
"openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.s390x",
"openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.x86_64",
"openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.aarch64",
"openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.ppc64le",
"openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.s390x",
"openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.x86_64",
"openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.aarch64",
"openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.ppc64le",
"openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.s390x",
"openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.x86_64",
"openSUSE Leap 15.4:busybox-warewulf3-1.35.0-150400.3.3.1.aarch64",
"openSUSE Leap 15.4:busybox-warewulf3-1.35.0-150400.3.3.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2018-1000517",
"url": "https://www.suse.com/security/cve/CVE-2018-1000517"
},
{
"category": "external",
"summary": "SUSE Bug 1099260 for CVE-2018-1000517",
"url": "https://bugzilla.suse.com/1099260"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.x86_64",
"openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.aarch64",
"openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.ppc64le",
"openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.s390x",
"openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.x86_64",
"openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.aarch64",
"openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.ppc64le",
"openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.s390x",
"openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.x86_64",
"openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.aarch64",
"openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.ppc64le",
"openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.s390x",
"openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.x86_64",
"openSUSE Leap 15.4:busybox-warewulf3-1.35.0-150400.3.3.1.aarch64",
"openSUSE Leap 15.4:busybox-warewulf3-1.35.0-150400.3.3.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.6,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.x86_64",
"openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.aarch64",
"openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.ppc64le",
"openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.s390x",
"openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.x86_64",
"openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.aarch64",
"openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.ppc64le",
"openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.s390x",
"openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.x86_64",
"openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.aarch64",
"openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.ppc64le",
"openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.s390x",
"openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.x86_64",
"openSUSE Leap 15.4:busybox-warewulf3-1.35.0-150400.3.3.1.aarch64",
"openSUSE Leap 15.4:busybox-warewulf3-1.35.0-150400.3.3.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-11-11T14:38:22Z",
"details": "important"
}
],
"title": "CVE-2018-1000517"
},
{
"cve": "CVE-2018-20679",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2018-20679"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in BusyBox before 1.30.0. An out of bounds read in udhcp components (consumed by the DHCP server, client, and relay) allows a remote attacker to leak sensitive information from the stack by sending a crafted DHCP message. This is related to verification in udhcp_get_option() in networking/udhcp/common.c that 4-byte options are indeed 4 bytes.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.x86_64",
"openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.aarch64",
"openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.ppc64le",
"openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.s390x",
"openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.x86_64",
"openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.aarch64",
"openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.ppc64le",
"openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.s390x",
"openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.x86_64",
"openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.aarch64",
"openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.ppc64le",
"openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.s390x",
"openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.x86_64",
"openSUSE Leap 15.4:busybox-warewulf3-1.35.0-150400.3.3.1.aarch64",
"openSUSE Leap 15.4:busybox-warewulf3-1.35.0-150400.3.3.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2018-20679",
"url": "https://www.suse.com/security/cve/CVE-2018-20679"
},
{
"category": "external",
"summary": "SUSE Bug 1121426 for CVE-2018-20679",
"url": "https://bugzilla.suse.com/1121426"
},
{
"category": "external",
"summary": "SUSE Bug 1121428 for CVE-2018-20679",
"url": "https://bugzilla.suse.com/1121428"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.x86_64",
"openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.aarch64",
"openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.ppc64le",
"openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.s390x",
"openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.x86_64",
"openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.aarch64",
"openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.ppc64le",
"openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.s390x",
"openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.x86_64",
"openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.aarch64",
"openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.ppc64le",
"openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.s390x",
"openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.x86_64",
"openSUSE Leap 15.4:busybox-warewulf3-1.35.0-150400.3.3.1.aarch64",
"openSUSE Leap 15.4:busybox-warewulf3-1.35.0-150400.3.3.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.x86_64",
"openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.aarch64",
"openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.ppc64le",
"openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.s390x",
"openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.x86_64",
"openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.aarch64",
"openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.ppc64le",
"openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.s390x",
"openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.x86_64",
"openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.aarch64",
"openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.ppc64le",
"openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.s390x",
"openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.x86_64",
"openSUSE Leap 15.4:busybox-warewulf3-1.35.0-150400.3.3.1.aarch64",
"openSUSE Leap 15.4:busybox-warewulf3-1.35.0-150400.3.3.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-11-11T14:38:22Z",
"details": "moderate"
}
],
"title": "CVE-2018-20679"
},
{
"cve": "CVE-2019-5747",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-5747"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in BusyBox through 1.30.0. An out of bounds read in udhcp components (consumed by the DHCP client, server, and/or relay) might allow a remote attacker to leak sensitive information from the stack by sending a crafted DHCP message. This is related to assurance of a 4-byte length when decoding DHCP_SUBNET. NOTE: this issue exists because of an incomplete fix for CVE-2018-20679.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.x86_64",
"openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.aarch64",
"openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.ppc64le",
"openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.s390x",
"openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.x86_64",
"openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.aarch64",
"openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.ppc64le",
"openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.s390x",
"openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.x86_64",
"openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.aarch64",
"openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.ppc64le",
"openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.s390x",
"openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.x86_64",
"openSUSE Leap 15.4:busybox-warewulf3-1.35.0-150400.3.3.1.aarch64",
"openSUSE Leap 15.4:busybox-warewulf3-1.35.0-150400.3.3.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-5747",
"url": "https://www.suse.com/security/cve/CVE-2019-5747"
},
{
"category": "external",
"summary": "SUSE Bug 1121426 for CVE-2019-5747",
"url": "https://bugzilla.suse.com/1121426"
},
{
"category": "external",
"summary": "SUSE Bug 1121428 for CVE-2019-5747",
"url": "https://bugzilla.suse.com/1121428"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.x86_64",
"openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.aarch64",
"openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.ppc64le",
"openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.s390x",
"openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.x86_64",
"openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.aarch64",
"openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.ppc64le",
"openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.s390x",
"openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.x86_64",
"openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.aarch64",
"openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.ppc64le",
"openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.s390x",
"openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.x86_64",
"openSUSE Leap 15.4:busybox-warewulf3-1.35.0-150400.3.3.1.aarch64",
"openSUSE Leap 15.4:busybox-warewulf3-1.35.0-150400.3.3.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.5,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.x86_64",
"openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.aarch64",
"openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.ppc64le",
"openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.s390x",
"openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.x86_64",
"openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.aarch64",
"openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.ppc64le",
"openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.s390x",
"openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.x86_64",
"openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.aarch64",
"openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.ppc64le",
"openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.s390x",
"openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.x86_64",
"openSUSE Leap 15.4:busybox-warewulf3-1.35.0-150400.3.3.1.aarch64",
"openSUSE Leap 15.4:busybox-warewulf3-1.35.0-150400.3.3.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-11-11T14:38:22Z",
"details": "low"
}
],
"title": "CVE-2019-5747"
},
{
"cve": "CVE-2021-28831",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-28831"
}
],
"notes": [
{
"category": "general",
"text": "decompress_gunzip.c in BusyBox through 1.32.1 mishandles the error bit on the huft_build result pointer, with a resultant invalid free or segmentation fault, via malformed gzip data.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.x86_64",
"openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.aarch64",
"openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.ppc64le",
"openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.s390x",
"openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.x86_64",
"openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.aarch64",
"openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.ppc64le",
"openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.s390x",
"openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.x86_64",
"openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.aarch64",
"openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.ppc64le",
"openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.s390x",
"openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.x86_64",
"openSUSE Leap 15.4:busybox-warewulf3-1.35.0-150400.3.3.1.aarch64",
"openSUSE Leap 15.4:busybox-warewulf3-1.35.0-150400.3.3.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-28831",
"url": "https://www.suse.com/security/cve/CVE-2021-28831"
},
{
"category": "external",
"summary": "SUSE Bug 1184522 for CVE-2021-28831",
"url": "https://bugzilla.suse.com/1184522"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.x86_64",
"openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.aarch64",
"openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.ppc64le",
"openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.s390x",
"openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.x86_64",
"openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.aarch64",
"openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.ppc64le",
"openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.s390x",
"openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.x86_64",
"openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.aarch64",
"openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.ppc64le",
"openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.s390x",
"openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.x86_64",
"openSUSE Leap 15.4:busybox-warewulf3-1.35.0-150400.3.3.1.aarch64",
"openSUSE Leap 15.4:busybox-warewulf3-1.35.0-150400.3.3.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.x86_64",
"openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.aarch64",
"openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.ppc64le",
"openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.s390x",
"openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.x86_64",
"openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.aarch64",
"openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.ppc64le",
"openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.s390x",
"openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.x86_64",
"openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.aarch64",
"openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.ppc64le",
"openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.s390x",
"openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.x86_64",
"openSUSE Leap 15.4:busybox-warewulf3-1.35.0-150400.3.3.1.aarch64",
"openSUSE Leap 15.4:busybox-warewulf3-1.35.0-150400.3.3.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-11-11T14:38:22Z",
"details": "important"
}
],
"title": "CVE-2021-28831"
},
{
"cve": "CVE-2021-42373",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-42373"
}
],
"notes": [
{
"category": "general",
"text": "A NULL pointer dereference in Busybox\u0027s man applet leads to denial of service when a section name is supplied but no page argument is given",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.x86_64",
"openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.aarch64",
"openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.ppc64le",
"openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.s390x",
"openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.x86_64",
"openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.aarch64",
"openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.ppc64le",
"openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.s390x",
"openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.x86_64",
"openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.aarch64",
"openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.ppc64le",
"openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.s390x",
"openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.x86_64",
"openSUSE Leap 15.4:busybox-warewulf3-1.35.0-150400.3.3.1.aarch64",
"openSUSE Leap 15.4:busybox-warewulf3-1.35.0-150400.3.3.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-42373",
"url": "https://www.suse.com/security/cve/CVE-2021-42373"
},
{
"category": "external",
"summary": "SUSE Bug 1192869 for CVE-2021-42373",
"url": "https://bugzilla.suse.com/1192869"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.x86_64",
"openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.aarch64",
"openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.ppc64le",
"openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.s390x",
"openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.x86_64",
"openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.aarch64",
"openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.ppc64le",
"openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.s390x",
"openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.x86_64",
"openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.aarch64",
"openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.ppc64le",
"openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.s390x",
"openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.x86_64",
"openSUSE Leap 15.4:busybox-warewulf3-1.35.0-150400.3.3.1.aarch64",
"openSUSE Leap 15.4:busybox-warewulf3-1.35.0-150400.3.3.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.x86_64",
"openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.aarch64",
"openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.ppc64le",
"openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.s390x",
"openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.x86_64",
"openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.aarch64",
"openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.ppc64le",
"openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.s390x",
"openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.x86_64",
"openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.aarch64",
"openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.ppc64le",
"openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.s390x",
"openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.x86_64",
"openSUSE Leap 15.4:busybox-warewulf3-1.35.0-150400.3.3.1.aarch64",
"openSUSE Leap 15.4:busybox-warewulf3-1.35.0-150400.3.3.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-11-11T14:38:22Z",
"details": "moderate"
}
],
"title": "CVE-2021-42373"
},
{
"cve": "CVE-2021-42374",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-42374"
}
],
"notes": [
{
"category": "general",
"text": "An out-of-bounds heap read in Busybox\u0027s unlzma applet leads to information leak and denial of service when crafted LZMA-compressed input is decompressed. This can be triggered by any applet/format that",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.x86_64",
"openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.aarch64",
"openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.ppc64le",
"openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.s390x",
"openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.x86_64",
"openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.aarch64",
"openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.ppc64le",
"openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.s390x",
"openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.x86_64",
"openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.aarch64",
"openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.ppc64le",
"openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.s390x",
"openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.x86_64",
"openSUSE Leap 15.4:busybox-warewulf3-1.35.0-150400.3.3.1.aarch64",
"openSUSE Leap 15.4:busybox-warewulf3-1.35.0-150400.3.3.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-42374",
"url": "https://www.suse.com/security/cve/CVE-2021-42374"
},
{
"category": "external",
"summary": "SUSE Bug 1192869 for CVE-2021-42374",
"url": "https://bugzilla.suse.com/1192869"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.x86_64",
"openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.aarch64",
"openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.ppc64le",
"openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.s390x",
"openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.x86_64",
"openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.aarch64",
"openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.ppc64le",
"openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.s390x",
"openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.x86_64",
"openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.aarch64",
"openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.ppc64le",
"openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.s390x",
"openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.x86_64",
"openSUSE Leap 15.4:busybox-warewulf3-1.35.0-150400.3.3.1.aarch64",
"openSUSE Leap 15.4:busybox-warewulf3-1.35.0-150400.3.3.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.x86_64",
"openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.aarch64",
"openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.ppc64le",
"openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.s390x",
"openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.x86_64",
"openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.aarch64",
"openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.ppc64le",
"openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.s390x",
"openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.x86_64",
"openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.aarch64",
"openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.ppc64le",
"openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.s390x",
"openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.x86_64",
"openSUSE Leap 15.4:busybox-warewulf3-1.35.0-150400.3.3.1.aarch64",
"openSUSE Leap 15.4:busybox-warewulf3-1.35.0-150400.3.3.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-11-11T14:38:22Z",
"details": "moderate"
}
],
"title": "CVE-2021-42374"
},
{
"cve": "CVE-2021-42375",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-42375"
}
],
"notes": [
{
"category": "general",
"text": "An incorrect handling of a special element in Busybox\u0027s ash applet leads to denial of service when processing a crafted shell command, due to the shell mistaking specific characters for reserved characters. This may be used for DoS under rare conditions of filtered command input.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.x86_64",
"openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.aarch64",
"openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.ppc64le",
"openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.s390x",
"openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.x86_64",
"openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.aarch64",
"openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.ppc64le",
"openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.s390x",
"openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.x86_64",
"openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.aarch64",
"openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.ppc64le",
"openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.s390x",
"openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.x86_64",
"openSUSE Leap 15.4:busybox-warewulf3-1.35.0-150400.3.3.1.aarch64",
"openSUSE Leap 15.4:busybox-warewulf3-1.35.0-150400.3.3.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-42375",
"url": "https://www.suse.com/security/cve/CVE-2021-42375"
},
{
"category": "external",
"summary": "SUSE Bug 1192869 for CVE-2021-42375",
"url": "https://bugzilla.suse.com/1192869"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.x86_64",
"openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.aarch64",
"openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.ppc64le",
"openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.s390x",
"openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.x86_64",
"openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.aarch64",
"openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.ppc64le",
"openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.s390x",
"openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.x86_64",
"openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.aarch64",
"openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.ppc64le",
"openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.s390x",
"openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.x86_64",
"openSUSE Leap 15.4:busybox-warewulf3-1.35.0-150400.3.3.1.aarch64",
"openSUSE Leap 15.4:busybox-warewulf3-1.35.0-150400.3.3.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.1,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.x86_64",
"openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.aarch64",
"openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.ppc64le",
"openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.s390x",
"openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.x86_64",
"openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.aarch64",
"openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.ppc64le",
"openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.s390x",
"openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.x86_64",
"openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.aarch64",
"openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.ppc64le",
"openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.s390x",
"openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.x86_64",
"openSUSE Leap 15.4:busybox-warewulf3-1.35.0-150400.3.3.1.aarch64",
"openSUSE Leap 15.4:busybox-warewulf3-1.35.0-150400.3.3.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-11-11T14:38:22Z",
"details": "moderate"
}
],
"title": "CVE-2021-42375"
},
{
"cve": "CVE-2021-42376",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-42376"
}
],
"notes": [
{
"category": "general",
"text": "A NULL pointer dereference in Busybox\u0027s hush applet leads to denial of service when processing a crafted shell command, due to missing validation after a \\x03 delimiter character. This may be used for DoS under very rare conditions of filtered command input.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.x86_64",
"openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.aarch64",
"openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.ppc64le",
"openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.s390x",
"openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.x86_64",
"openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.aarch64",
"openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.ppc64le",
"openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.s390x",
"openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.x86_64",
"openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.aarch64",
"openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.ppc64le",
"openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.s390x",
"openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.x86_64",
"openSUSE Leap 15.4:busybox-warewulf3-1.35.0-150400.3.3.1.aarch64",
"openSUSE Leap 15.4:busybox-warewulf3-1.35.0-150400.3.3.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-42376",
"url": "https://www.suse.com/security/cve/CVE-2021-42376"
},
{
"category": "external",
"summary": "SUSE Bug 1192869 for CVE-2021-42376",
"url": "https://bugzilla.suse.com/1192869"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.x86_64",
"openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.aarch64",
"openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.ppc64le",
"openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.s390x",
"openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.x86_64",
"openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.aarch64",
"openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.ppc64le",
"openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.s390x",
"openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.x86_64",
"openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.aarch64",
"openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.ppc64le",
"openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.s390x",
"openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.x86_64",
"openSUSE Leap 15.4:busybox-warewulf3-1.35.0-150400.3.3.1.aarch64",
"openSUSE Leap 15.4:busybox-warewulf3-1.35.0-150400.3.3.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.1,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.x86_64",
"openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.aarch64",
"openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.ppc64le",
"openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.s390x",
"openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.x86_64",
"openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.aarch64",
"openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.ppc64le",
"openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.s390x",
"openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.x86_64",
"openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.aarch64",
"openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.ppc64le",
"openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.s390x",
"openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.x86_64",
"openSUSE Leap 15.4:busybox-warewulf3-1.35.0-150400.3.3.1.aarch64",
"openSUSE Leap 15.4:busybox-warewulf3-1.35.0-150400.3.3.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-11-11T14:38:22Z",
"details": "moderate"
}
],
"title": "CVE-2021-42376"
},
{
"cve": "CVE-2021-42377",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-42377"
}
],
"notes": [
{
"category": "general",
"text": "An attacker-controlled pointer free in Busybox\u0027s hush applet leads to denial of service and possible code execution when processing a crafted shell command, due to the shell mishandling the \u0026\u0026\u0026 string. This may be used for remote code execution under rare conditions of filtered command input.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.x86_64",
"openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.aarch64",
"openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.ppc64le",
"openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.s390x",
"openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.x86_64",
"openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.aarch64",
"openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.ppc64le",
"openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.s390x",
"openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.x86_64",
"openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.aarch64",
"openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.ppc64le",
"openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.s390x",
"openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.x86_64",
"openSUSE Leap 15.4:busybox-warewulf3-1.35.0-150400.3.3.1.aarch64",
"openSUSE Leap 15.4:busybox-warewulf3-1.35.0-150400.3.3.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-42377",
"url": "https://www.suse.com/security/cve/CVE-2021-42377"
},
{
"category": "external",
"summary": "SUSE Bug 1192869 for CVE-2021-42377",
"url": "https://bugzilla.suse.com/1192869"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.x86_64",
"openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.aarch64",
"openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.ppc64le",
"openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.s390x",
"openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.x86_64",
"openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.aarch64",
"openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.ppc64le",
"openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.s390x",
"openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.x86_64",
"openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.aarch64",
"openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.ppc64le",
"openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.s390x",
"openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.x86_64",
"openSUSE Leap 15.4:busybox-warewulf3-1.35.0-150400.3.3.1.aarch64",
"openSUSE Leap 15.4:busybox-warewulf3-1.35.0-150400.3.3.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.x86_64",
"openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.aarch64",
"openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.ppc64le",
"openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.s390x",
"openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.x86_64",
"openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.aarch64",
"openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.ppc64le",
"openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.s390x",
"openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.x86_64",
"openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.aarch64",
"openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.ppc64le",
"openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.s390x",
"openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.x86_64",
"openSUSE Leap 15.4:busybox-warewulf3-1.35.0-150400.3.3.1.aarch64",
"openSUSE Leap 15.4:busybox-warewulf3-1.35.0-150400.3.3.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-11-11T14:38:22Z",
"details": "moderate"
}
],
"title": "CVE-2021-42377"
},
{
"cve": "CVE-2021-42378",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-42378"
}
],
"notes": [
{
"category": "general",
"text": "A use-after-free in Busybox\u0027s awk applet leads to denial of service and possibly code execution when processing a crafted awk pattern in the getvar_i function",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.x86_64",
"openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.aarch64",
"openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.ppc64le",
"openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.s390x",
"openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.x86_64",
"openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.aarch64",
"openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.ppc64le",
"openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.s390x",
"openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.x86_64",
"openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.aarch64",
"openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.ppc64le",
"openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.s390x",
"openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.x86_64",
"openSUSE Leap 15.4:busybox-warewulf3-1.35.0-150400.3.3.1.aarch64",
"openSUSE Leap 15.4:busybox-warewulf3-1.35.0-150400.3.3.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-42378",
"url": "https://www.suse.com/security/cve/CVE-2021-42378"
},
{
"category": "external",
"summary": "SUSE Bug 1192869 for CVE-2021-42378",
"url": "https://bugzilla.suse.com/1192869"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.x86_64",
"openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.aarch64",
"openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.ppc64le",
"openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.s390x",
"openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.x86_64",
"openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.aarch64",
"openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.ppc64le",
"openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.s390x",
"openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.x86_64",
"openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.aarch64",
"openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.ppc64le",
"openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.s390x",
"openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.x86_64",
"openSUSE Leap 15.4:busybox-warewulf3-1.35.0-150400.3.3.1.aarch64",
"openSUSE Leap 15.4:busybox-warewulf3-1.35.0-150400.3.3.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.6,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.x86_64",
"openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.aarch64",
"openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.ppc64le",
"openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.s390x",
"openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.x86_64",
"openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.aarch64",
"openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.ppc64le",
"openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.s390x",
"openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.x86_64",
"openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.aarch64",
"openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.ppc64le",
"openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.s390x",
"openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.x86_64",
"openSUSE Leap 15.4:busybox-warewulf3-1.35.0-150400.3.3.1.aarch64",
"openSUSE Leap 15.4:busybox-warewulf3-1.35.0-150400.3.3.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-11-11T14:38:22Z",
"details": "moderate"
}
],
"title": "CVE-2021-42378"
},
{
"cve": "CVE-2021-42379",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-42379"
}
],
"notes": [
{
"category": "general",
"text": "A use-after-free in Busybox\u0027s awk applet leads to denial of service and possibly code execution when processing a crafted awk pattern in the next_input_file function",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.x86_64",
"openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.aarch64",
"openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.ppc64le",
"openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.s390x",
"openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.x86_64",
"openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.aarch64",
"openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.ppc64le",
"openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.s390x",
"openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.x86_64",
"openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.aarch64",
"openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.ppc64le",
"openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.s390x",
"openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.x86_64",
"openSUSE Leap 15.4:busybox-warewulf3-1.35.0-150400.3.3.1.aarch64",
"openSUSE Leap 15.4:busybox-warewulf3-1.35.0-150400.3.3.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-42379",
"url": "https://www.suse.com/security/cve/CVE-2021-42379"
},
{
"category": "external",
"summary": "SUSE Bug 1192869 for CVE-2021-42379",
"url": "https://bugzilla.suse.com/1192869"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.x86_64",
"openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.aarch64",
"openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.ppc64le",
"openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.s390x",
"openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.x86_64",
"openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.aarch64",
"openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.ppc64le",
"openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.s390x",
"openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.x86_64",
"openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.aarch64",
"openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.ppc64le",
"openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.s390x",
"openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.x86_64",
"openSUSE Leap 15.4:busybox-warewulf3-1.35.0-150400.3.3.1.aarch64",
"openSUSE Leap 15.4:busybox-warewulf3-1.35.0-150400.3.3.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.6,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.x86_64",
"openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.aarch64",
"openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.ppc64le",
"openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.s390x",
"openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.x86_64",
"openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.aarch64",
"openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.ppc64le",
"openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.s390x",
"openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.x86_64",
"openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.aarch64",
"openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.ppc64le",
"openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.s390x",
"openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.x86_64",
"openSUSE Leap 15.4:busybox-warewulf3-1.35.0-150400.3.3.1.aarch64",
"openSUSE Leap 15.4:busybox-warewulf3-1.35.0-150400.3.3.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-11-11T14:38:22Z",
"details": "moderate"
}
],
"title": "CVE-2021-42379"
},
{
"cve": "CVE-2021-42380",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-42380"
}
],
"notes": [
{
"category": "general",
"text": "A use-after-free in Busybox\u0027s awk applet leads to denial of service and possibly code execution when processing a crafted awk pattern in the clrvar function",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.x86_64",
"openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.aarch64",
"openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.ppc64le",
"openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.s390x",
"openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.x86_64",
"openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.aarch64",
"openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.ppc64le",
"openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.s390x",
"openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.x86_64",
"openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.aarch64",
"openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.ppc64le",
"openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.s390x",
"openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.x86_64",
"openSUSE Leap 15.4:busybox-warewulf3-1.35.0-150400.3.3.1.aarch64",
"openSUSE Leap 15.4:busybox-warewulf3-1.35.0-150400.3.3.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-42380",
"url": "https://www.suse.com/security/cve/CVE-2021-42380"
},
{
"category": "external",
"summary": "SUSE Bug 1192869 for CVE-2021-42380",
"url": "https://bugzilla.suse.com/1192869"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.x86_64",
"openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.aarch64",
"openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.ppc64le",
"openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.s390x",
"openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.x86_64",
"openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.aarch64",
"openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.ppc64le",
"openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.s390x",
"openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.x86_64",
"openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.aarch64",
"openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.ppc64le",
"openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.s390x",
"openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.x86_64",
"openSUSE Leap 15.4:busybox-warewulf3-1.35.0-150400.3.3.1.aarch64",
"openSUSE Leap 15.4:busybox-warewulf3-1.35.0-150400.3.3.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.6,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.x86_64",
"openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.aarch64",
"openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.ppc64le",
"openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.s390x",
"openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.x86_64",
"openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.aarch64",
"openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.ppc64le",
"openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.s390x",
"openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.x86_64",
"openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.aarch64",
"openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.ppc64le",
"openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.s390x",
"openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.x86_64",
"openSUSE Leap 15.4:busybox-warewulf3-1.35.0-150400.3.3.1.aarch64",
"openSUSE Leap 15.4:busybox-warewulf3-1.35.0-150400.3.3.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-11-11T14:38:22Z",
"details": "moderate"
}
],
"title": "CVE-2021-42380"
},
{
"cve": "CVE-2021-42381",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-42381"
}
],
"notes": [
{
"category": "general",
"text": "A use-after-free in Busybox\u0027s awk applet leads to denial of service and possibly code execution when processing a crafted awk pattern in the hash_init function",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.x86_64",
"openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.aarch64",
"openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.ppc64le",
"openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.s390x",
"openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.x86_64",
"openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.aarch64",
"openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.ppc64le",
"openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.s390x",
"openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.x86_64",
"openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.aarch64",
"openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.ppc64le",
"openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.s390x",
"openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.x86_64",
"openSUSE Leap 15.4:busybox-warewulf3-1.35.0-150400.3.3.1.aarch64",
"openSUSE Leap 15.4:busybox-warewulf3-1.35.0-150400.3.3.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-42381",
"url": "https://www.suse.com/security/cve/CVE-2021-42381"
},
{
"category": "external",
"summary": "SUSE Bug 1192869 for CVE-2021-42381",
"url": "https://bugzilla.suse.com/1192869"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.x86_64",
"openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.aarch64",
"openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.ppc64le",
"openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.s390x",
"openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.x86_64",
"openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.aarch64",
"openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.ppc64le",
"openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.s390x",
"openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.x86_64",
"openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.aarch64",
"openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.ppc64le",
"openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.s390x",
"openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.x86_64",
"openSUSE Leap 15.4:busybox-warewulf3-1.35.0-150400.3.3.1.aarch64",
"openSUSE Leap 15.4:busybox-warewulf3-1.35.0-150400.3.3.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.6,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.x86_64",
"openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.aarch64",
"openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.ppc64le",
"openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.s390x",
"openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.x86_64",
"openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.aarch64",
"openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.ppc64le",
"openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.s390x",
"openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.x86_64",
"openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.aarch64",
"openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.ppc64le",
"openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.s390x",
"openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.x86_64",
"openSUSE Leap 15.4:busybox-warewulf3-1.35.0-150400.3.3.1.aarch64",
"openSUSE Leap 15.4:busybox-warewulf3-1.35.0-150400.3.3.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-11-11T14:38:22Z",
"details": "moderate"
}
],
"title": "CVE-2021-42381"
},
{
"cve": "CVE-2021-42382",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-42382"
}
],
"notes": [
{
"category": "general",
"text": "A use-after-free in Busybox\u0027s awk applet leads to denial of service and possibly code execution when processing a crafted awk pattern in the getvar_s function",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.x86_64",
"openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.aarch64",
"openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.ppc64le",
"openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.s390x",
"openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.x86_64",
"openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.aarch64",
"openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.ppc64le",
"openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.s390x",
"openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.x86_64",
"openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.aarch64",
"openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.ppc64le",
"openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.s390x",
"openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.x86_64",
"openSUSE Leap 15.4:busybox-warewulf3-1.35.0-150400.3.3.1.aarch64",
"openSUSE Leap 15.4:busybox-warewulf3-1.35.0-150400.3.3.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-42382",
"url": "https://www.suse.com/security/cve/CVE-2021-42382"
},
{
"category": "external",
"summary": "SUSE Bug 1192869 for CVE-2021-42382",
"url": "https://bugzilla.suse.com/1192869"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.x86_64",
"openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.aarch64",
"openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.ppc64le",
"openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.s390x",
"openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.x86_64",
"openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.aarch64",
"openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.ppc64le",
"openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.s390x",
"openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.x86_64",
"openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.aarch64",
"openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.ppc64le",
"openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.s390x",
"openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.x86_64",
"openSUSE Leap 15.4:busybox-warewulf3-1.35.0-150400.3.3.1.aarch64",
"openSUSE Leap 15.4:busybox-warewulf3-1.35.0-150400.3.3.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.6,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.x86_64",
"openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.aarch64",
"openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.ppc64le",
"openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.s390x",
"openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.x86_64",
"openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.aarch64",
"openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.ppc64le",
"openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.s390x",
"openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.x86_64",
"openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.aarch64",
"openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.ppc64le",
"openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.s390x",
"openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.x86_64",
"openSUSE Leap 15.4:busybox-warewulf3-1.35.0-150400.3.3.1.aarch64",
"openSUSE Leap 15.4:busybox-warewulf3-1.35.0-150400.3.3.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-11-11T14:38:22Z",
"details": "moderate"
}
],
"title": "CVE-2021-42382"
},
{
"cve": "CVE-2021-42383",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-42383"
}
],
"notes": [
{
"category": "general",
"text": "A use-after-free in Busybox\u0027s awk applet leads to denial of service and possibly code execution when processing a crafted awk pattern in the evaluate function",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.x86_64",
"openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.aarch64",
"openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.ppc64le",
"openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.s390x",
"openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.x86_64",
"openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.aarch64",
"openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.ppc64le",
"openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.s390x",
"openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.x86_64",
"openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.aarch64",
"openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.ppc64le",
"openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.s390x",
"openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.x86_64",
"openSUSE Leap 15.4:busybox-warewulf3-1.35.0-150400.3.3.1.aarch64",
"openSUSE Leap 15.4:busybox-warewulf3-1.35.0-150400.3.3.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-42383",
"url": "https://www.suse.com/security/cve/CVE-2021-42383"
},
{
"category": "external",
"summary": "SUSE Bug 1192869 for CVE-2021-42383",
"url": "https://bugzilla.suse.com/1192869"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.x86_64",
"openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.aarch64",
"openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.ppc64le",
"openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.s390x",
"openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.x86_64",
"openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.aarch64",
"openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.ppc64le",
"openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.s390x",
"openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.x86_64",
"openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.aarch64",
"openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.ppc64le",
"openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.s390x",
"openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.x86_64",
"openSUSE Leap 15.4:busybox-warewulf3-1.35.0-150400.3.3.1.aarch64",
"openSUSE Leap 15.4:busybox-warewulf3-1.35.0-150400.3.3.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.6,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.x86_64",
"openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.aarch64",
"openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.ppc64le",
"openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.s390x",
"openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.x86_64",
"openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.aarch64",
"openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.ppc64le",
"openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.s390x",
"openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.x86_64",
"openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.aarch64",
"openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.ppc64le",
"openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.s390x",
"openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.x86_64",
"openSUSE Leap 15.4:busybox-warewulf3-1.35.0-150400.3.3.1.aarch64",
"openSUSE Leap 15.4:busybox-warewulf3-1.35.0-150400.3.3.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-11-11T14:38:22Z",
"details": "moderate"
}
],
"title": "CVE-2021-42383"
},
{
"cve": "CVE-2021-42384",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-42384"
}
],
"notes": [
{
"category": "general",
"text": "A use-after-free in Busybox\u0027s awk applet leads to denial of service and possibly code execution when processing a crafted awk pattern in the handle_special function",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.x86_64",
"openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.aarch64",
"openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.ppc64le",
"openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.s390x",
"openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.x86_64",
"openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.aarch64",
"openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.ppc64le",
"openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.s390x",
"openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.x86_64",
"openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.aarch64",
"openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.ppc64le",
"openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.s390x",
"openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.x86_64",
"openSUSE Leap 15.4:busybox-warewulf3-1.35.0-150400.3.3.1.aarch64",
"openSUSE Leap 15.4:busybox-warewulf3-1.35.0-150400.3.3.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-42384",
"url": "https://www.suse.com/security/cve/CVE-2021-42384"
},
{
"category": "external",
"summary": "SUSE Bug 1192869 for CVE-2021-42384",
"url": "https://bugzilla.suse.com/1192869"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.x86_64",
"openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.aarch64",
"openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.ppc64le",
"openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.s390x",
"openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.x86_64",
"openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.aarch64",
"openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.ppc64le",
"openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.s390x",
"openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.x86_64",
"openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.aarch64",
"openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.ppc64le",
"openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.s390x",
"openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.x86_64",
"openSUSE Leap 15.4:busybox-warewulf3-1.35.0-150400.3.3.1.aarch64",
"openSUSE Leap 15.4:busybox-warewulf3-1.35.0-150400.3.3.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.6,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.x86_64",
"openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.aarch64",
"openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.ppc64le",
"openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.s390x",
"openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.x86_64",
"openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.aarch64",
"openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.ppc64le",
"openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.s390x",
"openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.x86_64",
"openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.aarch64",
"openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.ppc64le",
"openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.s390x",
"openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.x86_64",
"openSUSE Leap 15.4:busybox-warewulf3-1.35.0-150400.3.3.1.aarch64",
"openSUSE Leap 15.4:busybox-warewulf3-1.35.0-150400.3.3.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-11-11T14:38:22Z",
"details": "moderate"
}
],
"title": "CVE-2021-42384"
},
{
"cve": "CVE-2021-42385",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-42385"
}
],
"notes": [
{
"category": "general",
"text": "A use-after-free in Busybox\u0027s awk applet leads to denial of service and possibly code execution when processing a crafted awk pattern in the evaluate function",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.x86_64",
"openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.aarch64",
"openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.ppc64le",
"openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.s390x",
"openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.x86_64",
"openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.aarch64",
"openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.ppc64le",
"openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.s390x",
"openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.x86_64",
"openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.aarch64",
"openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.ppc64le",
"openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.s390x",
"openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.x86_64",
"openSUSE Leap 15.4:busybox-warewulf3-1.35.0-150400.3.3.1.aarch64",
"openSUSE Leap 15.4:busybox-warewulf3-1.35.0-150400.3.3.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-42385",
"url": "https://www.suse.com/security/cve/CVE-2021-42385"
},
{
"category": "external",
"summary": "SUSE Bug 1192869 for CVE-2021-42385",
"url": "https://bugzilla.suse.com/1192869"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.x86_64",
"openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.aarch64",
"openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.ppc64le",
"openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.s390x",
"openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.x86_64",
"openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.aarch64",
"openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.ppc64le",
"openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.s390x",
"openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.x86_64",
"openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.aarch64",
"openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.ppc64le",
"openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.s390x",
"openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.x86_64",
"openSUSE Leap 15.4:busybox-warewulf3-1.35.0-150400.3.3.1.aarch64",
"openSUSE Leap 15.4:busybox-warewulf3-1.35.0-150400.3.3.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.6,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.x86_64",
"openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.aarch64",
"openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.ppc64le",
"openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.s390x",
"openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.x86_64",
"openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.aarch64",
"openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.ppc64le",
"openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.s390x",
"openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.x86_64",
"openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.aarch64",
"openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.ppc64le",
"openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.s390x",
"openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.x86_64",
"openSUSE Leap 15.4:busybox-warewulf3-1.35.0-150400.3.3.1.aarch64",
"openSUSE Leap 15.4:busybox-warewulf3-1.35.0-150400.3.3.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-11-11T14:38:22Z",
"details": "moderate"
}
],
"title": "CVE-2021-42385"
},
{
"cve": "CVE-2021-42386",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-42386"
}
],
"notes": [
{
"category": "general",
"text": "A use-after-free in Busybox\u0027s awk applet leads to denial of service and possibly code execution when processing a crafted awk pattern in the nvalloc function",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.x86_64",
"openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.aarch64",
"openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.ppc64le",
"openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.s390x",
"openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.x86_64",
"openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.aarch64",
"openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.ppc64le",
"openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.s390x",
"openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.x86_64",
"openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.aarch64",
"openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.ppc64le",
"openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.s390x",
"openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.x86_64",
"openSUSE Leap 15.4:busybox-warewulf3-1.35.0-150400.3.3.1.aarch64",
"openSUSE Leap 15.4:busybox-warewulf3-1.35.0-150400.3.3.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-42386",
"url": "https://www.suse.com/security/cve/CVE-2021-42386"
},
{
"category": "external",
"summary": "SUSE Bug 1192869 for CVE-2021-42386",
"url": "https://bugzilla.suse.com/1192869"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.x86_64",
"openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.aarch64",
"openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.ppc64le",
"openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.s390x",
"openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.x86_64",
"openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.aarch64",
"openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.ppc64le",
"openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.s390x",
"openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.x86_64",
"openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.aarch64",
"openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.ppc64le",
"openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.s390x",
"openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.x86_64",
"openSUSE Leap 15.4:busybox-warewulf3-1.35.0-150400.3.3.1.aarch64",
"openSUSE Leap 15.4:busybox-warewulf3-1.35.0-150400.3.3.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.6,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-1.35.0-150400.3.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:busybox-static-1.35.0-150400.3.3.1.x86_64",
"openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.aarch64",
"openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.ppc64le",
"openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.s390x",
"openSUSE Leap 15.4:busybox-1.35.0-150400.3.3.1.x86_64",
"openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.aarch64",
"openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.ppc64le",
"openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.s390x",
"openSUSE Leap 15.4:busybox-static-1.35.0-150400.3.3.1.x86_64",
"openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.aarch64",
"openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.ppc64le",
"openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.s390x",
"openSUSE Leap 15.4:busybox-testsuite-1.35.0-150400.3.3.1.x86_64",
"openSUSE Leap 15.4:busybox-warewulf3-1.35.0-150400.3.3.1.aarch64",
"openSUSE Leap 15.4:busybox-warewulf3-1.35.0-150400.3.3.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-11-11T14:38:22Z",
"details": "moderate"
}
],
"title": "CVE-2021-42386"
}
]
}
SUSE-SU-2022:0135-2
Vulnerability from csaf_suse - Published: 2022-02-14 10:50 - Updated: 2022-02-14 10:50Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for busybox",
"title": "Title of the patch"
},
{
"category": "description",
"text": "This update for busybox fixes the following issues:\n\n- CVE-2011-5325: Fixed tar directory traversal (bsc#951562).\n- CVE-2015-9261: Fixed segfalts and application crashes in huft_build (bsc#1102912).\n- CVE-2016-2147: Fixed out of bounds write (heap) due to integer underflow in udhcpc (bsc#970663).\n- CVE-2016-2148: Fixed heap-based buffer overflow in OPTION_6RD parsing (bsc#970662).\n- CVE-2016-6301: Fixed NTP server denial of service flaw (bsc#991940).\n- CVE-2017-15873: Fixed integer overflow in get_next_block function in archival/libarchive/decompress_bunzip2.c (bsc#1064976).\n- CVE-2017-15874: Fixed integer underflow in archival/libarchive/decompress_unlzma.c (bsc#1064978).\n- CVE-2017-16544: Fixed Insufficient sanitization of filenames when autocompleting (bsc#1069412).\n- CVE-2018-1000500 : Fixed missing SSL certificate validation in wget (bsc#1099263).\n- CVE-2018-1000517: Fixed heap-based buffer overflow in the retrieve_file_data() (bsc#1099260).\n- CVE-2018-20679: Fixed out of bounds read in udhcp (bsc#1121426).\n- CVE-2019-5747: Fixed out of bounds read in udhcp components (bsc#1121428).\n- CVE-2021-28831: Fixed invalid free or segmentation fault via malformed gzip data (bsc#1184522).\n- CVE-2021-42373: Fixed NULL pointer dereference in man leading to DoS when a section name is supplied but no page argument is given (bsc#1192869).\n- CVE-2021-42374: Fixed out-of-bounds heap read in unlzma leading to information leak and DoS when crafted LZMA-compressed input is decompressed (bsc#1192869).\n- CVE-2021-42375: Fixed incorrect handling of a special element in ash leading to DoS when processing a crafted shell command, due to the shell mistaking specific characters for reserved characters (bsc#1192869).\n- CVE-2021-42376: Fixed NULL pointer dereference in hush leading to DoS when processing a crafted shell command (bsc#1192869).\n- CVE-2021-42377: Fixed attacker-controlled pointer free in hush leading to DoS and possible code execution when processing a crafted shell command (bsc#1192869).\n- CVE-2021-42378: Fixed use-after-free in awk leading to DoS and possibly code execution when processing a crafted awk pattern in the getvar_i function (bsc#1192869).\n- CVE-2021-42379: Fixed use-after-free in awk leading to DoS and possibly code execution when processing a crafted awk pattern in the next_input_file function (bsc#1192869).\n- CVE-2021-42380: Fixed use-after-free in awk leading to DoS and possibly code execution when processing a crafted awk pattern in the clrvar function (bsc#1192869).\n- CVE-2021-42381: Fixed use-after-free in awk leading to DoS and possibly code execution when processing a crafted awk pattern in the hash_init function (bsc#1192869).\n- CVE-2021-42382: Fixed use-after-free in awk leading to DoS and possibly code execution when processing a crafted awk pattern in the getvar_s function (bsc#1192869).\n- CVE-2021-42383: Fixed use-after-free in awk leading to DoS and possibly code execution when processing a crafted awk pattern in the evaluate function (bsc#1192869).\n- CVE-2021-42384: Fixed use-after-free in awk leading to DoS and possibly code execution when processing a crafted awk pattern in the handle_special function (bsc#1192869).\n- CVE-2021-42385: Fixed use-after-free in awk leading to DoS and possibly code execution when processing a crafted awk pattern in the evaluate function (bsc#1192869).\n- CVE-2021-42386: Fixed use-after-free in awk leading to DoS and possibly code execution when processing a crafted awk pattern in the nvalloc function (bsc#1192869).\n",
"title": "Description of the patch"
},
{
"category": "details",
"text": "SUSE-2022-135,SUSE-SLE-Product-RT-15-SP2-2022-135",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2022_0135-2.json"
},
{
"category": "self",
"summary": "URL for SUSE-SU-2022:0135-2",
"url": "https://www.suse.com/support/update/announcement/2022/suse-su-20220135-2/"
},
{
"category": "self",
"summary": "E-Mail link for SUSE-SU-2022:0135-2",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2022-February/010220.html"
},
{
"category": "self",
"summary": "SUSE Bug 1064976",
"url": "https://bugzilla.suse.com/1064976"
},
{
"category": "self",
"summary": "SUSE Bug 1064978",
"url": "https://bugzilla.suse.com/1064978"
},
{
"category": "self",
"summary": "SUSE Bug 1069412",
"url": "https://bugzilla.suse.com/1069412"
},
{
"category": "self",
"summary": "SUSE Bug 1099260",
"url": "https://bugzilla.suse.com/1099260"
},
{
"category": "self",
"summary": "SUSE Bug 1099263",
"url": "https://bugzilla.suse.com/1099263"
},
{
"category": "self",
"summary": "SUSE Bug 1102912",
"url": "https://bugzilla.suse.com/1102912"
},
{
"category": "self",
"summary": "SUSE Bug 1121426",
"url": "https://bugzilla.suse.com/1121426"
},
{
"category": "self",
"summary": "SUSE Bug 1121428",
"url": "https://bugzilla.suse.com/1121428"
},
{
"category": "self",
"summary": "SUSE Bug 1184522",
"url": "https://bugzilla.suse.com/1184522"
},
{
"category": "self",
"summary": "SUSE Bug 1192869",
"url": "https://bugzilla.suse.com/1192869"
},
{
"category": "self",
"summary": "SUSE Bug 951562",
"url": "https://bugzilla.suse.com/951562"
},
{
"category": "self",
"summary": "SUSE Bug 970662",
"url": "https://bugzilla.suse.com/970662"
},
{
"category": "self",
"summary": "SUSE Bug 970663",
"url": "https://bugzilla.suse.com/970663"
},
{
"category": "self",
"summary": "SUSE Bug 991940",
"url": "https://bugzilla.suse.com/991940"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2011-5325 page",
"url": "https://www.suse.com/security/cve/CVE-2011-5325/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2015-9261 page",
"url": "https://www.suse.com/security/cve/CVE-2015-9261/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2016-2147 page",
"url": "https://www.suse.com/security/cve/CVE-2016-2147/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2016-2148 page",
"url": "https://www.suse.com/security/cve/CVE-2016-2148/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2016-6301 page",
"url": "https://www.suse.com/security/cve/CVE-2016-6301/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-15873 page",
"url": "https://www.suse.com/security/cve/CVE-2017-15873/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-15874 page",
"url": "https://www.suse.com/security/cve/CVE-2017-15874/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-16544 page",
"url": "https://www.suse.com/security/cve/CVE-2017-16544/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2018-1000500 page",
"url": "https://www.suse.com/security/cve/CVE-2018-1000500/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2018-1000517 page",
"url": "https://www.suse.com/security/cve/CVE-2018-1000517/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2018-20679 page",
"url": "https://www.suse.com/security/cve/CVE-2018-20679/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-5747 page",
"url": "https://www.suse.com/security/cve/CVE-2019-5747/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-28831 page",
"url": "https://www.suse.com/security/cve/CVE-2021-28831/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-42373 page",
"url": "https://www.suse.com/security/cve/CVE-2021-42373/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-42374 page",
"url": "https://www.suse.com/security/cve/CVE-2021-42374/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-42375 page",
"url": "https://www.suse.com/security/cve/CVE-2021-42375/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-42376 page",
"url": "https://www.suse.com/security/cve/CVE-2021-42376/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-42377 page",
"url": "https://www.suse.com/security/cve/CVE-2021-42377/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-42378 page",
"url": "https://www.suse.com/security/cve/CVE-2021-42378/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-42379 page",
"url": "https://www.suse.com/security/cve/CVE-2021-42379/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-42380 page",
"url": "https://www.suse.com/security/cve/CVE-2021-42380/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-42381 page",
"url": "https://www.suse.com/security/cve/CVE-2021-42381/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-42382 page",
"url": "https://www.suse.com/security/cve/CVE-2021-42382/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-42383 page",
"url": "https://www.suse.com/security/cve/CVE-2021-42383/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-42384 page",
"url": "https://www.suse.com/security/cve/CVE-2021-42384/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-42385 page",
"url": "https://www.suse.com/security/cve/CVE-2021-42385/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-42386 page",
"url": "https://www.suse.com/security/cve/CVE-2021-42386/"
}
],
"title": "Security update for busybox",
"tracking": {
"current_release_date": "2022-02-14T10:50:28Z",
"generator": {
"date": "2022-02-14T10:50:28Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "SUSE-SU-2022:0135-2",
"initial_release_date": "2022-02-14T10:50:28Z",
"revision_history": [
{
"date": "2022-02-14T10:50:28Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "busybox-1.34.1-4.9.1.aarch64",
"product": {
"name": "busybox-1.34.1-4.9.1.aarch64",
"product_id": "busybox-1.34.1-4.9.1.aarch64"
}
},
{
"category": "product_version",
"name": "busybox-static-1.34.1-4.9.1.aarch64",
"product": {
"name": "busybox-static-1.34.1-4.9.1.aarch64",
"product_id": "busybox-static-1.34.1-4.9.1.aarch64"
}
},
{
"category": "product_version",
"name": "busybox-testsuite-1.34.1-4.9.1.aarch64",
"product": {
"name": "busybox-testsuite-1.34.1-4.9.1.aarch64",
"product_id": "busybox-testsuite-1.34.1-4.9.1.aarch64"
}
},
{
"category": "product_version",
"name": "busybox-warewulf3-1.34.1-4.9.1.aarch64",
"product": {
"name": "busybox-warewulf3-1.34.1-4.9.1.aarch64",
"product_id": "busybox-warewulf3-1.34.1-4.9.1.aarch64"
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "busybox-1.34.1-4.9.1.i586",
"product": {
"name": "busybox-1.34.1-4.9.1.i586",
"product_id": "busybox-1.34.1-4.9.1.i586"
}
},
{
"category": "product_version",
"name": "busybox-static-1.34.1-4.9.1.i586",
"product": {
"name": "busybox-static-1.34.1-4.9.1.i586",
"product_id": "busybox-static-1.34.1-4.9.1.i586"
}
},
{
"category": "product_version",
"name": "busybox-testsuite-1.34.1-4.9.1.i586",
"product": {
"name": "busybox-testsuite-1.34.1-4.9.1.i586",
"product_id": "busybox-testsuite-1.34.1-4.9.1.i586"
}
},
{
"category": "product_version",
"name": "busybox-warewulf3-1.34.1-4.9.1.i586",
"product": {
"name": "busybox-warewulf3-1.34.1-4.9.1.i586",
"product_id": "busybox-warewulf3-1.34.1-4.9.1.i586"
}
}
],
"category": "architecture",
"name": "i586"
},
{
"branches": [
{
"category": "product_version",
"name": "busybox-1.34.1-4.9.1.ppc64le",
"product": {
"name": "busybox-1.34.1-4.9.1.ppc64le",
"product_id": "busybox-1.34.1-4.9.1.ppc64le"
}
},
{
"category": "product_version",
"name": "busybox-static-1.34.1-4.9.1.ppc64le",
"product": {
"name": "busybox-static-1.34.1-4.9.1.ppc64le",
"product_id": "busybox-static-1.34.1-4.9.1.ppc64le"
}
},
{
"category": "product_version",
"name": "busybox-testsuite-1.34.1-4.9.1.ppc64le",
"product": {
"name": "busybox-testsuite-1.34.1-4.9.1.ppc64le",
"product_id": "busybox-testsuite-1.34.1-4.9.1.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "busybox-1.34.1-4.9.1.s390x",
"product": {
"name": "busybox-1.34.1-4.9.1.s390x",
"product_id": "busybox-1.34.1-4.9.1.s390x"
}
},
{
"category": "product_version",
"name": "busybox-static-1.34.1-4.9.1.s390x",
"product": {
"name": "busybox-static-1.34.1-4.9.1.s390x",
"product_id": "busybox-static-1.34.1-4.9.1.s390x"
}
},
{
"category": "product_version",
"name": "busybox-testsuite-1.34.1-4.9.1.s390x",
"product": {
"name": "busybox-testsuite-1.34.1-4.9.1.s390x",
"product_id": "busybox-testsuite-1.34.1-4.9.1.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "busybox-1.34.1-4.9.1.x86_64",
"product": {
"name": "busybox-1.34.1-4.9.1.x86_64",
"product_id": "busybox-1.34.1-4.9.1.x86_64"
}
},
{
"category": "product_version",
"name": "busybox-static-1.34.1-4.9.1.x86_64",
"product": {
"name": "busybox-static-1.34.1-4.9.1.x86_64",
"product_id": "busybox-static-1.34.1-4.9.1.x86_64"
}
},
{
"category": "product_version",
"name": "busybox-testsuite-1.34.1-4.9.1.x86_64",
"product": {
"name": "busybox-testsuite-1.34.1-4.9.1.x86_64",
"product_id": "busybox-testsuite-1.34.1-4.9.1.x86_64"
}
},
{
"category": "product_version",
"name": "busybox-warewulf3-1.34.1-4.9.1.x86_64",
"product": {
"name": "busybox-warewulf3-1.34.1-4.9.1.x86_64",
"product_id": "busybox-warewulf3-1.34.1-4.9.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux Enterprise Real Time 15 SP2",
"product": {
"name": "SUSE Linux Enterprise Real Time 15 SP2",
"product_id": "SUSE Linux Enterprise Real Time 15 SP2",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle_rt:15:sp2"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "busybox-1.34.1-4.9.1.x86_64 as component of SUSE Linux Enterprise Real Time 15 SP2",
"product_id": "SUSE Linux Enterprise Real Time 15 SP2:busybox-1.34.1-4.9.1.x86_64"
},
"product_reference": "busybox-1.34.1-4.9.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Real Time 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "busybox-static-1.34.1-4.9.1.x86_64 as component of SUSE Linux Enterprise Real Time 15 SP2",
"product_id": "SUSE Linux Enterprise Real Time 15 SP2:busybox-static-1.34.1-4.9.1.x86_64"
},
"product_reference": "busybox-static-1.34.1-4.9.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Real Time 15 SP2"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2011-5325",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2011-5325"
}
],
"notes": [
{
"category": "general",
"text": "Directory traversal vulnerability in the BusyBox implementation of tar before 1.22.0 v5 allows remote attackers to point to files outside the current working directory via a symlink.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Real Time 15 SP2:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Real Time 15 SP2:busybox-static-1.34.1-4.9.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2011-5325",
"url": "https://www.suse.com/security/cve/CVE-2011-5325"
},
{
"category": "external",
"summary": "SUSE Bug 951562 for CVE-2011-5325",
"url": "https://bugzilla.suse.com/951562"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Real Time 15 SP2:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Real Time 15 SP2:busybox-static-1.34.1-4.9.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Real Time 15 SP2:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Real Time 15 SP2:busybox-static-1.34.1-4.9.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-02-14T10:50:28Z",
"details": "moderate"
}
],
"title": "CVE-2011-5325"
},
{
"cve": "CVE-2015-9261",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2015-9261"
}
],
"notes": [
{
"category": "general",
"text": "huft_build in archival/libarchive/decompress_gunzip.c in BusyBox before 1.27.2 misuses a pointer, causing segfaults and an application crash during an unzip operation on a specially crafted ZIP file.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Real Time 15 SP2:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Real Time 15 SP2:busybox-static-1.34.1-4.9.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2015-9261",
"url": "https://www.suse.com/security/cve/CVE-2015-9261"
},
{
"category": "external",
"summary": "SUSE Bug 1102912 for CVE-2015-9261",
"url": "https://bugzilla.suse.com/1102912"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Real Time 15 SP2:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Real Time 15 SP2:busybox-static-1.34.1-4.9.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Real Time 15 SP2:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Real Time 15 SP2:busybox-static-1.34.1-4.9.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-02-14T10:50:28Z",
"details": "low"
}
],
"title": "CVE-2015-9261"
},
{
"cve": "CVE-2016-2147",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2016-2147"
}
],
"notes": [
{
"category": "general",
"text": "Integer overflow in the DHCP client (udhcpc) in BusyBox before 1.25.0 allows remote attackers to cause a denial of service (crash) via a malformed RFC1035-encoded domain name, which triggers an out-of-bounds heap write.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Real Time 15 SP2:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Real Time 15 SP2:busybox-static-1.34.1-4.9.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2016-2147",
"url": "https://www.suse.com/security/cve/CVE-2016-2147"
},
{
"category": "external",
"summary": "SUSE Bug 970663 for CVE-2016-2147",
"url": "https://bugzilla.suse.com/970663"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Real Time 15 SP2:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Real Time 15 SP2:busybox-static-1.34.1-4.9.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Real Time 15 SP2:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Real Time 15 SP2:busybox-static-1.34.1-4.9.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-02-14T10:50:28Z",
"details": "important"
}
],
"title": "CVE-2016-2147"
},
{
"cve": "CVE-2016-2148",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2016-2148"
}
],
"notes": [
{
"category": "general",
"text": "Heap-based buffer overflow in the DHCP client (udhcpc) in BusyBox before 1.25.0 allows remote attackers to have unspecified impact via vectors involving OPTION_6RD parsing.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Real Time 15 SP2:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Real Time 15 SP2:busybox-static-1.34.1-4.9.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2016-2148",
"url": "https://www.suse.com/security/cve/CVE-2016-2148"
},
{
"category": "external",
"summary": "SUSE Bug 970662 for CVE-2016-2148",
"url": "https://bugzilla.suse.com/970662"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Real Time 15 SP2:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Real Time 15 SP2:busybox-static-1.34.1-4.9.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Real Time 15 SP2:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Real Time 15 SP2:busybox-static-1.34.1-4.9.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-02-14T10:50:28Z",
"details": "moderate"
}
],
"title": "CVE-2016-2148"
},
{
"cve": "CVE-2016-6301",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2016-6301"
}
],
"notes": [
{
"category": "general",
"text": "The recv_and_process_client_pkt function in networking/ntpd.c in busybox allows remote attackers to cause a denial of service (CPU and bandwidth consumption) via a forged NTP packet, which triggers a communication loop.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Real Time 15 SP2:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Real Time 15 SP2:busybox-static-1.34.1-4.9.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2016-6301",
"url": "https://www.suse.com/security/cve/CVE-2016-6301"
},
{
"category": "external",
"summary": "SUSE Bug 991940 for CVE-2016-6301",
"url": "https://bugzilla.suse.com/991940"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Real Time 15 SP2:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Real Time 15 SP2:busybox-static-1.34.1-4.9.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Real Time 15 SP2:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Real Time 15 SP2:busybox-static-1.34.1-4.9.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-02-14T10:50:28Z",
"details": "moderate"
}
],
"title": "CVE-2016-6301"
},
{
"cve": "CVE-2017-15873",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-15873"
}
],
"notes": [
{
"category": "general",
"text": "The get_next_block function in archival/libarchive/decompress_bunzip2.c in BusyBox 1.27.2 has an Integer Overflow that may lead to a write access violation.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Real Time 15 SP2:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Real Time 15 SP2:busybox-static-1.34.1-4.9.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-15873",
"url": "https://www.suse.com/security/cve/CVE-2017-15873"
},
{
"category": "external",
"summary": "SUSE Bug 1064976 for CVE-2017-15873",
"url": "https://bugzilla.suse.com/1064976"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Real Time 15 SP2:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Real Time 15 SP2:busybox-static-1.34.1-4.9.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Real Time 15 SP2:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Real Time 15 SP2:busybox-static-1.34.1-4.9.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-02-14T10:50:28Z",
"details": "moderate"
}
],
"title": "CVE-2017-15873"
},
{
"cve": "CVE-2017-15874",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-15874"
}
],
"notes": [
{
"category": "general",
"text": "archival/libarchive/decompress_unlzma.c in BusyBox 1.27.2 has an Integer Underflow that leads to a read access violation.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Real Time 15 SP2:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Real Time 15 SP2:busybox-static-1.34.1-4.9.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-15874",
"url": "https://www.suse.com/security/cve/CVE-2017-15874"
},
{
"category": "external",
"summary": "SUSE Bug 1064978 for CVE-2017-15874",
"url": "https://bugzilla.suse.com/1064978"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Real Time 15 SP2:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Real Time 15 SP2:busybox-static-1.34.1-4.9.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.3,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Real Time 15 SP2:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Real Time 15 SP2:busybox-static-1.34.1-4.9.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-02-14T10:50:28Z",
"details": "low"
}
],
"title": "CVE-2017-15874"
},
{
"cve": "CVE-2017-16544",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-16544"
}
],
"notes": [
{
"category": "general",
"text": "In the add_match function in libbb/lineedit.c in BusyBox through 1.27.2, the tab autocomplete feature of the shell, used to get a list of filenames in a directory, does not sanitize filenames and results in executing any escape sequence in the terminal. This could potentially result in code execution, arbitrary file writes, or other attacks.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Real Time 15 SP2:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Real Time 15 SP2:busybox-static-1.34.1-4.9.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-16544",
"url": "https://www.suse.com/security/cve/CVE-2017-16544"
},
{
"category": "external",
"summary": "SUSE Bug 1069412 for CVE-2017-16544",
"url": "https://bugzilla.suse.com/1069412"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Real Time 15 SP2:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Real Time 15 SP2:busybox-static-1.34.1-4.9.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Real Time 15 SP2:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Real Time 15 SP2:busybox-static-1.34.1-4.9.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-02-14T10:50:28Z",
"details": "moderate"
}
],
"title": "CVE-2017-16544"
},
{
"cve": "CVE-2018-1000500",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2018-1000500"
}
],
"notes": [
{
"category": "general",
"text": "Busybox contains a Missing SSL certificate validation vulnerability in The \"busybox wget\" applet that can result in arbitrary code execution. This attack appear to be exploitable via Simply download any file over HTTPS using \"busybox wget https://compromised-domain.com/important-file\".",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Real Time 15 SP2:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Real Time 15 SP2:busybox-static-1.34.1-4.9.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2018-1000500",
"url": "https://www.suse.com/security/cve/CVE-2018-1000500"
},
{
"category": "external",
"summary": "SUSE Bug 1099263 for CVE-2018-1000500",
"url": "https://bugzilla.suse.com/1099263"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Real Time 15 SP2:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Real Time 15 SP2:busybox-static-1.34.1-4.9.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Real Time 15 SP2:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Real Time 15 SP2:busybox-static-1.34.1-4.9.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-02-14T10:50:28Z",
"details": "important"
}
],
"title": "CVE-2018-1000500"
},
{
"cve": "CVE-2018-1000517",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2018-1000517"
}
],
"notes": [
{
"category": "general",
"text": "BusyBox project BusyBox wget version prior to commit 8e2174e9bd836e53c8b9c6e00d1bc6e2a718686e contains a Buffer Overflow vulnerability in Busybox wget that can result in heap buffer overflow. This attack appear to be exploitable via network connectivity. This vulnerability appears to have been fixed in after commit 8e2174e9bd836e53c8b9c6e00d1bc6e2a718686e.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Real Time 15 SP2:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Real Time 15 SP2:busybox-static-1.34.1-4.9.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2018-1000517",
"url": "https://www.suse.com/security/cve/CVE-2018-1000517"
},
{
"category": "external",
"summary": "SUSE Bug 1099260 for CVE-2018-1000517",
"url": "https://bugzilla.suse.com/1099260"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Real Time 15 SP2:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Real Time 15 SP2:busybox-static-1.34.1-4.9.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.6,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Real Time 15 SP2:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Real Time 15 SP2:busybox-static-1.34.1-4.9.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-02-14T10:50:28Z",
"details": "important"
}
],
"title": "CVE-2018-1000517"
},
{
"cve": "CVE-2018-20679",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2018-20679"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in BusyBox before 1.30.0. An out of bounds read in udhcp components (consumed by the DHCP server, client, and relay) allows a remote attacker to leak sensitive information from the stack by sending a crafted DHCP message. This is related to verification in udhcp_get_option() in networking/udhcp/common.c that 4-byte options are indeed 4 bytes.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Real Time 15 SP2:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Real Time 15 SP2:busybox-static-1.34.1-4.9.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2018-20679",
"url": "https://www.suse.com/security/cve/CVE-2018-20679"
},
{
"category": "external",
"summary": "SUSE Bug 1121426 for CVE-2018-20679",
"url": "https://bugzilla.suse.com/1121426"
},
{
"category": "external",
"summary": "SUSE Bug 1121428 for CVE-2018-20679",
"url": "https://bugzilla.suse.com/1121428"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Real Time 15 SP2:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Real Time 15 SP2:busybox-static-1.34.1-4.9.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Real Time 15 SP2:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Real Time 15 SP2:busybox-static-1.34.1-4.9.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-02-14T10:50:28Z",
"details": "moderate"
}
],
"title": "CVE-2018-20679"
},
{
"cve": "CVE-2019-5747",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-5747"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in BusyBox through 1.30.0. An out of bounds read in udhcp components (consumed by the DHCP client, server, and/or relay) might allow a remote attacker to leak sensitive information from the stack by sending a crafted DHCP message. This is related to assurance of a 4-byte length when decoding DHCP_SUBNET. NOTE: this issue exists because of an incomplete fix for CVE-2018-20679.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Real Time 15 SP2:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Real Time 15 SP2:busybox-static-1.34.1-4.9.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-5747",
"url": "https://www.suse.com/security/cve/CVE-2019-5747"
},
{
"category": "external",
"summary": "SUSE Bug 1121426 for CVE-2019-5747",
"url": "https://bugzilla.suse.com/1121426"
},
{
"category": "external",
"summary": "SUSE Bug 1121428 for CVE-2019-5747",
"url": "https://bugzilla.suse.com/1121428"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Real Time 15 SP2:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Real Time 15 SP2:busybox-static-1.34.1-4.9.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.5,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Real Time 15 SP2:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Real Time 15 SP2:busybox-static-1.34.1-4.9.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-02-14T10:50:28Z",
"details": "low"
}
],
"title": "CVE-2019-5747"
},
{
"cve": "CVE-2021-28831",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-28831"
}
],
"notes": [
{
"category": "general",
"text": "decompress_gunzip.c in BusyBox through 1.32.1 mishandles the error bit on the huft_build result pointer, with a resultant invalid free or segmentation fault, via malformed gzip data.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Real Time 15 SP2:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Real Time 15 SP2:busybox-static-1.34.1-4.9.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-28831",
"url": "https://www.suse.com/security/cve/CVE-2021-28831"
},
{
"category": "external",
"summary": "SUSE Bug 1184522 for CVE-2021-28831",
"url": "https://bugzilla.suse.com/1184522"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Real Time 15 SP2:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Real Time 15 SP2:busybox-static-1.34.1-4.9.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Real Time 15 SP2:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Real Time 15 SP2:busybox-static-1.34.1-4.9.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-02-14T10:50:28Z",
"details": "important"
}
],
"title": "CVE-2021-28831"
},
{
"cve": "CVE-2021-42373",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-42373"
}
],
"notes": [
{
"category": "general",
"text": "A NULL pointer dereference in Busybox\u0027s man applet leads to denial of service when a section name is supplied but no page argument is given",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Real Time 15 SP2:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Real Time 15 SP2:busybox-static-1.34.1-4.9.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-42373",
"url": "https://www.suse.com/security/cve/CVE-2021-42373"
},
{
"category": "external",
"summary": "SUSE Bug 1192869 for CVE-2021-42373",
"url": "https://bugzilla.suse.com/1192869"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Real Time 15 SP2:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Real Time 15 SP2:busybox-static-1.34.1-4.9.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Real Time 15 SP2:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Real Time 15 SP2:busybox-static-1.34.1-4.9.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-02-14T10:50:28Z",
"details": "moderate"
}
],
"title": "CVE-2021-42373"
},
{
"cve": "CVE-2021-42374",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-42374"
}
],
"notes": [
{
"category": "general",
"text": "An out-of-bounds heap read in Busybox\u0027s unlzma applet leads to information leak and denial of service when crafted LZMA-compressed input is decompressed. This can be triggered by any applet/format that",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Real Time 15 SP2:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Real Time 15 SP2:busybox-static-1.34.1-4.9.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-42374",
"url": "https://www.suse.com/security/cve/CVE-2021-42374"
},
{
"category": "external",
"summary": "SUSE Bug 1192869 for CVE-2021-42374",
"url": "https://bugzilla.suse.com/1192869"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Real Time 15 SP2:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Real Time 15 SP2:busybox-static-1.34.1-4.9.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Real Time 15 SP2:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Real Time 15 SP2:busybox-static-1.34.1-4.9.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-02-14T10:50:28Z",
"details": "moderate"
}
],
"title": "CVE-2021-42374"
},
{
"cve": "CVE-2021-42375",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-42375"
}
],
"notes": [
{
"category": "general",
"text": "An incorrect handling of a special element in Busybox\u0027s ash applet leads to denial of service when processing a crafted shell command, due to the shell mistaking specific characters for reserved characters. This may be used for DoS under rare conditions of filtered command input.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Real Time 15 SP2:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Real Time 15 SP2:busybox-static-1.34.1-4.9.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-42375",
"url": "https://www.suse.com/security/cve/CVE-2021-42375"
},
{
"category": "external",
"summary": "SUSE Bug 1192869 for CVE-2021-42375",
"url": "https://bugzilla.suse.com/1192869"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Real Time 15 SP2:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Real Time 15 SP2:busybox-static-1.34.1-4.9.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.1,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Real Time 15 SP2:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Real Time 15 SP2:busybox-static-1.34.1-4.9.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-02-14T10:50:28Z",
"details": "moderate"
}
],
"title": "CVE-2021-42375"
},
{
"cve": "CVE-2021-42376",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-42376"
}
],
"notes": [
{
"category": "general",
"text": "A NULL pointer dereference in Busybox\u0027s hush applet leads to denial of service when processing a crafted shell command, due to missing validation after a \\x03 delimiter character. This may be used for DoS under very rare conditions of filtered command input.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Real Time 15 SP2:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Real Time 15 SP2:busybox-static-1.34.1-4.9.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-42376",
"url": "https://www.suse.com/security/cve/CVE-2021-42376"
},
{
"category": "external",
"summary": "SUSE Bug 1192869 for CVE-2021-42376",
"url": "https://bugzilla.suse.com/1192869"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Real Time 15 SP2:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Real Time 15 SP2:busybox-static-1.34.1-4.9.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.1,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Real Time 15 SP2:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Real Time 15 SP2:busybox-static-1.34.1-4.9.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-02-14T10:50:28Z",
"details": "moderate"
}
],
"title": "CVE-2021-42376"
},
{
"cve": "CVE-2021-42377",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-42377"
}
],
"notes": [
{
"category": "general",
"text": "An attacker-controlled pointer free in Busybox\u0027s hush applet leads to denial of service and possible code execution when processing a crafted shell command, due to the shell mishandling the \u0026\u0026\u0026 string. This may be used for remote code execution under rare conditions of filtered command input.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Real Time 15 SP2:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Real Time 15 SP2:busybox-static-1.34.1-4.9.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-42377",
"url": "https://www.suse.com/security/cve/CVE-2021-42377"
},
{
"category": "external",
"summary": "SUSE Bug 1192869 for CVE-2021-42377",
"url": "https://bugzilla.suse.com/1192869"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Real Time 15 SP2:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Real Time 15 SP2:busybox-static-1.34.1-4.9.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Real Time 15 SP2:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Real Time 15 SP2:busybox-static-1.34.1-4.9.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-02-14T10:50:28Z",
"details": "moderate"
}
],
"title": "CVE-2021-42377"
},
{
"cve": "CVE-2021-42378",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-42378"
}
],
"notes": [
{
"category": "general",
"text": "A use-after-free in Busybox\u0027s awk applet leads to denial of service and possibly code execution when processing a crafted awk pattern in the getvar_i function",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Real Time 15 SP2:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Real Time 15 SP2:busybox-static-1.34.1-4.9.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-42378",
"url": "https://www.suse.com/security/cve/CVE-2021-42378"
},
{
"category": "external",
"summary": "SUSE Bug 1192869 for CVE-2021-42378",
"url": "https://bugzilla.suse.com/1192869"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Real Time 15 SP2:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Real Time 15 SP2:busybox-static-1.34.1-4.9.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.6,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Real Time 15 SP2:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Real Time 15 SP2:busybox-static-1.34.1-4.9.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-02-14T10:50:28Z",
"details": "moderate"
}
],
"title": "CVE-2021-42378"
},
{
"cve": "CVE-2021-42379",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-42379"
}
],
"notes": [
{
"category": "general",
"text": "A use-after-free in Busybox\u0027s awk applet leads to denial of service and possibly code execution when processing a crafted awk pattern in the next_input_file function",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Real Time 15 SP2:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Real Time 15 SP2:busybox-static-1.34.1-4.9.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-42379",
"url": "https://www.suse.com/security/cve/CVE-2021-42379"
},
{
"category": "external",
"summary": "SUSE Bug 1192869 for CVE-2021-42379",
"url": "https://bugzilla.suse.com/1192869"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Real Time 15 SP2:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Real Time 15 SP2:busybox-static-1.34.1-4.9.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.6,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Real Time 15 SP2:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Real Time 15 SP2:busybox-static-1.34.1-4.9.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-02-14T10:50:28Z",
"details": "moderate"
}
],
"title": "CVE-2021-42379"
},
{
"cve": "CVE-2021-42380",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-42380"
}
],
"notes": [
{
"category": "general",
"text": "A use-after-free in Busybox\u0027s awk applet leads to denial of service and possibly code execution when processing a crafted awk pattern in the clrvar function",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Real Time 15 SP2:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Real Time 15 SP2:busybox-static-1.34.1-4.9.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-42380",
"url": "https://www.suse.com/security/cve/CVE-2021-42380"
},
{
"category": "external",
"summary": "SUSE Bug 1192869 for CVE-2021-42380",
"url": "https://bugzilla.suse.com/1192869"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Real Time 15 SP2:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Real Time 15 SP2:busybox-static-1.34.1-4.9.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.6,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Real Time 15 SP2:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Real Time 15 SP2:busybox-static-1.34.1-4.9.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-02-14T10:50:28Z",
"details": "moderate"
}
],
"title": "CVE-2021-42380"
},
{
"cve": "CVE-2021-42381",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-42381"
}
],
"notes": [
{
"category": "general",
"text": "A use-after-free in Busybox\u0027s awk applet leads to denial of service and possibly code execution when processing a crafted awk pattern in the hash_init function",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Real Time 15 SP2:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Real Time 15 SP2:busybox-static-1.34.1-4.9.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-42381",
"url": "https://www.suse.com/security/cve/CVE-2021-42381"
},
{
"category": "external",
"summary": "SUSE Bug 1192869 for CVE-2021-42381",
"url": "https://bugzilla.suse.com/1192869"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Real Time 15 SP2:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Real Time 15 SP2:busybox-static-1.34.1-4.9.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.6,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Real Time 15 SP2:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Real Time 15 SP2:busybox-static-1.34.1-4.9.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-02-14T10:50:28Z",
"details": "moderate"
}
],
"title": "CVE-2021-42381"
},
{
"cve": "CVE-2021-42382",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-42382"
}
],
"notes": [
{
"category": "general",
"text": "A use-after-free in Busybox\u0027s awk applet leads to denial of service and possibly code execution when processing a crafted awk pattern in the getvar_s function",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Real Time 15 SP2:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Real Time 15 SP2:busybox-static-1.34.1-4.9.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-42382",
"url": "https://www.suse.com/security/cve/CVE-2021-42382"
},
{
"category": "external",
"summary": "SUSE Bug 1192869 for CVE-2021-42382",
"url": "https://bugzilla.suse.com/1192869"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Real Time 15 SP2:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Real Time 15 SP2:busybox-static-1.34.1-4.9.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.6,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Real Time 15 SP2:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Real Time 15 SP2:busybox-static-1.34.1-4.9.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-02-14T10:50:28Z",
"details": "moderate"
}
],
"title": "CVE-2021-42382"
},
{
"cve": "CVE-2021-42383",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-42383"
}
],
"notes": [
{
"category": "general",
"text": "A use-after-free in Busybox\u0027s awk applet leads to denial of service and possibly code execution when processing a crafted awk pattern in the evaluate function",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Real Time 15 SP2:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Real Time 15 SP2:busybox-static-1.34.1-4.9.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-42383",
"url": "https://www.suse.com/security/cve/CVE-2021-42383"
},
{
"category": "external",
"summary": "SUSE Bug 1192869 for CVE-2021-42383",
"url": "https://bugzilla.suse.com/1192869"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Real Time 15 SP2:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Real Time 15 SP2:busybox-static-1.34.1-4.9.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.6,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Real Time 15 SP2:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Real Time 15 SP2:busybox-static-1.34.1-4.9.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-02-14T10:50:28Z",
"details": "moderate"
}
],
"title": "CVE-2021-42383"
},
{
"cve": "CVE-2021-42384",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-42384"
}
],
"notes": [
{
"category": "general",
"text": "A use-after-free in Busybox\u0027s awk applet leads to denial of service and possibly code execution when processing a crafted awk pattern in the handle_special function",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Real Time 15 SP2:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Real Time 15 SP2:busybox-static-1.34.1-4.9.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-42384",
"url": "https://www.suse.com/security/cve/CVE-2021-42384"
},
{
"category": "external",
"summary": "SUSE Bug 1192869 for CVE-2021-42384",
"url": "https://bugzilla.suse.com/1192869"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Real Time 15 SP2:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Real Time 15 SP2:busybox-static-1.34.1-4.9.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.6,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Real Time 15 SP2:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Real Time 15 SP2:busybox-static-1.34.1-4.9.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-02-14T10:50:28Z",
"details": "moderate"
}
],
"title": "CVE-2021-42384"
},
{
"cve": "CVE-2021-42385",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-42385"
}
],
"notes": [
{
"category": "general",
"text": "A use-after-free in Busybox\u0027s awk applet leads to denial of service and possibly code execution when processing a crafted awk pattern in the evaluate function",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Real Time 15 SP2:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Real Time 15 SP2:busybox-static-1.34.1-4.9.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-42385",
"url": "https://www.suse.com/security/cve/CVE-2021-42385"
},
{
"category": "external",
"summary": "SUSE Bug 1192869 for CVE-2021-42385",
"url": "https://bugzilla.suse.com/1192869"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Real Time 15 SP2:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Real Time 15 SP2:busybox-static-1.34.1-4.9.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.6,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Real Time 15 SP2:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Real Time 15 SP2:busybox-static-1.34.1-4.9.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-02-14T10:50:28Z",
"details": "moderate"
}
],
"title": "CVE-2021-42385"
},
{
"cve": "CVE-2021-42386",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-42386"
}
],
"notes": [
{
"category": "general",
"text": "A use-after-free in Busybox\u0027s awk applet leads to denial of service and possibly code execution when processing a crafted awk pattern in the nvalloc function",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Real Time 15 SP2:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Real Time 15 SP2:busybox-static-1.34.1-4.9.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-42386",
"url": "https://www.suse.com/security/cve/CVE-2021-42386"
},
{
"category": "external",
"summary": "SUSE Bug 1192869 for CVE-2021-42386",
"url": "https://bugzilla.suse.com/1192869"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Real Time 15 SP2:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Real Time 15 SP2:busybox-static-1.34.1-4.9.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.6,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Real Time 15 SP2:busybox-1.34.1-4.9.1.x86_64",
"SUSE Linux Enterprise Real Time 15 SP2:busybox-static-1.34.1-4.9.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-02-14T10:50:28Z",
"details": "moderate"
}
],
"title": "CVE-2021-42386"
}
]
}
GSD-2021-42384
Vulnerability from gsd - Updated: 2023-12-13 01:23{
"GSD": {
"alias": "CVE-2021-42384",
"description": "A use-after-free in Busybox\u0027s awk applet leads to denial of service and possibly code execution when processing a crafted awk pattern in the handle_special function",
"id": "GSD-2021-42384",
"references": [
"https://www.suse.com/security/cve/CVE-2021-42384.html",
"https://ubuntu.com/security/CVE-2021-42384",
"https://advisories.mageia.org/CVE-2021-42384.html",
"https://security.archlinux.org/CVE-2021-42384",
"https://alas.aws.amazon.com/cve/html/CVE-2021-42384.html"
]
},
"gsd": {
"metadata": {
"exploitCode": "unknown",
"remediation": "unknown",
"reportConfidence": "confirmed",
"type": "vulnerability"
},
"osvSchema": {
"aliases": [
"CVE-2021-42384"
],
"details": "A use-after-free in Busybox\u0027s awk applet leads to denial of service and possibly code execution when processing a crafted awk pattern in the handle_special function",
"id": "GSD-2021-42384",
"modified": "2023-12-13T01:23:06.449024Z",
"schema_version": "1.4.0"
}
},
"namespaces": {
"cve.org": {
"CVE_data_meta": {
"ASSIGNER": "security@jfrog.com",
"ID": "CVE-2021-42384",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "busybox",
"version": {
"version_data": [
{
"version_affected": "\u003c",
"version_value": "1.34.0"
}
]
}
}
]
},
"vendor_name": "busybox"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "A use-after-free in Busybox\u0027s awk applet leads to denial of service and possibly code execution when processing a crafted awk pattern in the handle_special function"
}
]
},
"impact": {
"cvssv3": {
"SCORE": "6.6"
}
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "CWE-416"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/",
"refsource": "MISC",
"url": "https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/"
},
{
"name": "FEDORA-2021-5a95823596",
"refsource": "FEDORA",
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/"
},
{
"name": "FEDORA-2021-c52c0fe490",
"refsource": "FEDORA",
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/"
},
{
"name": "https://security.netapp.com/advisory/ntap-20211223-0002/",
"refsource": "CONFIRM",
"url": "https://security.netapp.com/advisory/ntap-20211223-0002/"
},
{
"name": "https://claroty.com/team82/research/unboxing-busybox-14-vulnerabilities-uncovered-by-claroty-jfrog",
"refsource": "MISC",
"url": "https://claroty.com/team82/research/unboxing-busybox-14-vulnerabilities-uncovered-by-claroty-jfrog"
}
]
}
},
"nvd.nist.gov": {
"configurations": {
"CVE_data_version": "4.0",
"nodes": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:a:busybox:busybox:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndIncluding": "1.33.1",
"versionStartIncluding": "1.18.0",
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:fedoraproject:fedora:33:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:fedoraproject:fedora:34:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
}
]
},
"cve": {
"CVE_data_meta": {
"ASSIGNER": "security@jfrog.com",
"ID": "CVE-2021-42384"
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "en",
"value": "A use-after-free in Busybox\u0027s awk applet leads to denial of service and possibly code execution when processing a crafted awk pattern in the handle_special function"
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "en",
"value": "CWE-416"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "N/A",
"refsource": "N/A",
"tags": [
"Third Party Advisory"
],
"url": "https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/"
},
{
"name": "FEDORA-2021-c52c0fe490",
"refsource": "FEDORA",
"tags": [
"Mailing List",
"Third Party Advisory"
],
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/"
},
{
"name": "FEDORA-2021-5a95823596",
"refsource": "FEDORA",
"tags": [
"Mailing List",
"Third Party Advisory"
],
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/"
},
{
"name": "https://security.netapp.com/advisory/ntap-20211223-0002/",
"refsource": "CONFIRM",
"tags": [
"Third Party Advisory"
],
"url": "https://security.netapp.com/advisory/ntap-20211223-0002/"
},
{
"name": "https://claroty.com/team82/research/unboxing-busybox-14-vulnerabilities-uncovered-by-claroty-jfrog",
"refsource": "MISC",
"tags": [],
"url": "https://claroty.com/team82/research/unboxing-busybox-14-vulnerabilities-uncovered-by-claroty-jfrog"
}
]
}
},
"impact": {
"baseMetricV2": {
"acInsufInfo": false,
"cvssV2": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "SINGLE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.5,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P",
"version": "2.0"
},
"exploitabilityScore": 8.0,
"impactScore": 6.4,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"severity": "MEDIUM",
"userInteractionRequired": false
},
"baseMetricV3": {
"cvssV3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.2,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 1.2,
"impactScore": 5.9
}
},
"lastModifiedDate": "2023-04-25T22:15Z",
"publishedDate": "2021-11-15T21:15Z"
}
}
}
SSA-831302
Vulnerability from csaf_siemens - Published: 2023-06-13 00:00 - Updated: 2024-04-09 00:00Notes
{
"document": {
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Disclosure is not limited. (TLPv2: TLP:CLEAR)",
"tlp": {
"label": "WHITE"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Multiple vulnerabilities have been identified in the BIOS of the SIMATIC S7-1500 TM MFP before V1.3.0.\n\nSiemens has released a new version for SIMATIC S7-1500 TM MFP - BIOS and recommends to update to the latest version.",
"title": "Summary"
},
{
"category": "general",
"text": "As a general security measure, Siemens strongly recommends to protect network access to devices with appropriate mechanisms. In order to operate the devices in a protected IT environment, Siemens recommends to configure the environment according to Siemens\u0027 operational guidelines for Industrial Security (Download: \nhttps://www.siemens.com/cert/operational-guidelines-industrial-security), and to follow the recommendations in the product manuals.\nAdditional information on Industrial Security by Siemens can be found at: https://www.siemens.com/industrialsecurity",
"title": "General Recommendations"
},
{
"category": "general",
"text": "For further inquiries on security vulnerabilities in Siemens products and solutions, please contact the Siemens ProductCERT: https://www.siemens.com/cert/advisories",
"title": "Additional Resources"
},
{
"category": "legal_disclaimer",
"text": "Siemens Security Advisories are subject to the terms and conditions contained in Siemens\u0027 underlying license terms or other applicable agreements previously agreed to with Siemens (hereinafter \"License Terms\"). To the extent applicable to information, software or documentation made available in or through a Siemens Security Advisory, the Terms of Use of Siemens\u0027 Global Website (https://www.siemens.com/terms_of_use, hereinafter \"Terms of Use\"), in particular Sections 8-10 of the Terms of Use, shall apply additionally. In case of conflicts, the License Terms shall prevail over the Terms of Use.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "productcert@siemens.com",
"name": "Siemens ProductCERT",
"namespace": "https://www.siemens.com"
},
"references": [
{
"category": "self",
"summary": "SSA-831302: Vulnerabilities in the BIOS of the SIMATIC S7-1500 TM MFP before V1.3.0 - HTML Version",
"url": "https://cert-portal.siemens.com/productcert/html/ssa-831302.html"
},
{
"category": "self",
"summary": "SSA-831302: Vulnerabilities in the BIOS of the SIMATIC S7-1500 TM MFP before V1.3.0 - CSAF Version",
"url": "https://cert-portal.siemens.com/productcert/csaf/ssa-831302.json"
},
{
"category": "self",
"summary": "SSA-831302: Vulnerabilities in the BIOS of the SIMATIC S7-1500 TM MFP before V1.3.0 - PDF Version",
"url": "https://cert-portal.siemens.com/productcert/pdf/ssa-831302.pdf"
},
{
"category": "self",
"summary": "SSA-831302: Vulnerabilities in the BIOS of the SIMATIC S7-1500 TM MFP before V1.3.0 - TXT Version",
"url": "https://cert-portal.siemens.com/productcert/txt/ssa-831302.txt"
}
],
"title": "SSA-831302: Vulnerabilities in the BIOS of the SIMATIC S7-1500 TM MFP before V1.3.0",
"tracking": {
"current_release_date": "2024-04-09T00:00:00Z",
"generator": {
"engine": {
"name": "Siemens ProductCERT CSAF Generator",
"version": "1"
}
},
"id": "SSA-831302",
"initial_release_date": "2023-06-13T00:00:00Z",
"revision_history": [
{
"date": "2023-06-13T00:00:00Z",
"legacy_version": "1.0",
"number": "1",
"summary": "Publication Date"
},
{
"date": "2023-09-12T00:00:00Z",
"legacy_version": "1.1",
"number": "2",
"summary": "Added CVE-2022-1015, CVE-2023-2898, CVE-2023-31248, CVE-2023-3390, CVE-2023-35001, CVE-2023-3610, CVE-2023-3611, CVE-2023-3776, CVE-2023-4004, CVE-2023-4015, CVE-2023-4128, CVE-2023-4147, CVE-2023-4273"
},
{
"date": "2023-11-14T00:00:00Z",
"legacy_version": "1.2",
"number": "3",
"summary": "Added CVE-2023-4527, CVE-2023-4806, CVE-2023-4911, CVE-2023-5156"
},
{
"date": "2023-12-12T00:00:00Z",
"legacy_version": "1.3",
"number": "4",
"summary": "Added CVE-2021-44879, CVE-2023-45863"
},
{
"date": "2024-04-09T00:00:00Z",
"legacy_version": "1.4",
"number": "5",
"summary": "Added fix for SIMATIC S7-1500 TM MFP - BIOS"
}
],
"status": "interim",
"version": "5"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version_range",
"name": "\u003cV1.3.0",
"product": {
"name": "SIMATIC S7-1500 TM MFP - BIOS",
"product_id": "1"
}
}
],
"category": "product_name",
"name": "SIMATIC S7-1500 TM MFP - BIOS"
}
],
"category": "vendor",
"name": "Siemens"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2016-10228",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "summary",
"text": "The iconv program in the GNU C Library (aka glibc or libc6) 2.31 and earlier, when invoked with multiple suffixes in the destination encoding (TRANSLATE or IGNORE) along with the -c option, enters an infinite loop when processing invalid multi-byte input sequences, leading to a denial of service.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V1.3.0 or later version",
"product_ids": [
"1"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109945851/"
},
{
"category": "workaround",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2016-10228"
},
{
"cve": "CVE-2019-25013",
"cwe": {
"id": "CWE-125",
"name": "Out-of-bounds Read"
},
"notes": [
{
"category": "summary",
"text": "The iconv feature in the GNU C Library (aka glibc or libc6) through 2.32, when processing invalid multi-byte input sequences in the EUC-KR encoding, may have a buffer over-read.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V1.3.0 or later version",
"product_ids": [
"1"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109945851/"
},
{
"category": "workaround",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2019-25013"
},
{
"cve": "CVE-2020-1752",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"notes": [
{
"category": "summary",
"text": "A use-after-free vulnerability introduced in glibc upstream version 2.14 was found in the way the tilde expansion was carried out. Directory paths containing an initial tilde followed by a valid username were affected by this issue. A local attacker could exploit this flaw by creating a specially crafted path that, when processed by the glob function, would potentially lead to arbitrary code execution. This was fixed in version 2.32.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V1.3.0 or later version",
"product_ids": [
"1"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109945851/"
},
{
"category": "workaround",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.0,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2020-1752"
},
{
"cve": "CVE-2020-10029",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"notes": [
{
"category": "summary",
"text": "The GNU C Library (aka glibc or libc6) before 2.32 could overflow an on-stack buffer during range reduction if an input to an 80-bit long double function contains a non-canonical bit pattern, a seen when passing a 0x5d414141414141410000 value to sinl on x86 targets. This is related to sysdeps/ieee754/ldbl-96/e_rem_pio2l.c.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V1.3.0 or later version",
"product_ids": [
"1"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109945851/"
},
{
"category": "workaround",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2020-10029"
},
{
"cve": "CVE-2020-27618",
"cwe": {
"id": "CWE-835",
"name": "Loop with Unreachable Exit Condition (\u0027Infinite Loop\u0027)"
},
"notes": [
{
"category": "summary",
"text": "The iconv function in the GNU C Library (aka glibc or libc6) 2.32 and earlier, when processing invalid multi-byte input sequences in IBM1364, IBM1371, IBM1388, IBM1390, and IBM1399 encodings, fails to advance the input state, which could lead to an infinite loop in applications, resulting in a denial of service, a different vulnerability from CVE-2016-10228.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V1.3.0 or later version",
"product_ids": [
"1"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109945851/"
},
{
"category": "workaround",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2020-27618"
},
{
"cve": "CVE-2020-29562",
"cwe": {
"id": "CWE-617",
"name": "Reachable Assertion"
},
"notes": [
{
"category": "summary",
"text": "The iconv function in the GNU C Library (aka glibc or libc6) 2.30 to 2.32, when converting UCS4 text containing an irreversible character, fails an assertion in the code path and aborts the program, potentially resulting in a denial of service.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V1.3.0 or later version",
"product_ids": [
"1"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109945851/"
},
{
"category": "workaround",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.8,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2020-29562"
},
{
"cve": "CVE-2021-3326",
"cwe": {
"id": "CWE-617",
"name": "Reachable Assertion"
},
"notes": [
{
"category": "summary",
"text": "The iconv function in the GNU C Library (aka glibc or libc6) 2.32 and earlier, when processing invalid input sequences in the ISO-2022-JP-3 encoding, fails an assertion in the code path and aborts the program, potentially resulting in a denial of service.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V1.3.0 or later version",
"product_ids": [
"1"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109945851/"
},
{
"category": "workaround",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2021-3326"
},
{
"cve": "CVE-2021-3998",
"cwe": {
"id": "CWE-125",
"name": "Out-of-bounds Read"
},
"notes": [
{
"category": "summary",
"text": "A flaw was found in glibc. The realpath() function can mistakenly return an unexpected value, potentially leading to information leakage and disclosure of sensitive data.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V1.3.0 or later version",
"product_ids": [
"1"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109945851/"
},
{
"category": "workaround",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2021-3998"
},
{
"cve": "CVE-2021-3999",
"cwe": {
"id": "CWE-193",
"name": "Off-by-one Error"
},
"notes": [
{
"category": "summary",
"text": "A flaw was found in glibc. An off-by-one buffer overflow and underflow in getcwd() may lead to memory corruption when the size of the buffer is exactly 1. A local attacker who can control the input buffer and size passed to getcwd() in a setuid program could use this flaw to potentially execute arbitrary code and escalate their privileges on the system.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V1.3.0 or later version",
"product_ids": [
"1"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109945851/"
},
{
"category": "workaround",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2021-3999"
},
{
"cve": "CVE-2021-20269",
"cwe": {
"id": "CWE-276",
"name": "Incorrect Default Permissions"
},
"notes": [
{
"category": "summary",
"text": "A flaw was found in the permissions of a log file created by kexec-tools. This flaw allows a local unprivileged user to read this file and leak kernel internal information from a previous panic. The highest threat from this vulnerability is to confidentiality. This flaw affects kexec-tools shipped by Fedora versions prior to 2.0.21-8 and RHEL versions prior to 2.0.20-47.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V1.3.0 or later version",
"product_ids": [
"1"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109945851/"
},
{
"category": "workaround",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2021-20269"
},
{
"cve": "CVE-2021-27645",
"cwe": {
"id": "CWE-415",
"name": "Double Free"
},
"notes": [
{
"category": "summary",
"text": "The nameserver caching daemon (nscd) in the GNU C Library (aka glibc or libc6) 2.29 through 2.33, when processing a request for netgroup lookup, may crash due to a double-free, potentially resulting in degraded service or Denial of Service on the local system. This is related to netgroupcache.c.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V1.3.0 or later version",
"product_ids": [
"1"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109945851/"
},
{
"category": "workaround",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 2.5,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2021-27645"
},
{
"cve": "CVE-2021-28831",
"cwe": {
"id": "CWE-755",
"name": "Improper Handling of Exceptional Conditions"
},
"notes": [
{
"category": "summary",
"text": "decompress_gunzip.c in BusyBox through 1.32.1 mishandles the error bit on the huft_build result pointer, with a resultant invalid free or segmentation fault, via malformed gzip data.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V1.3.0 or later version",
"product_ids": [
"1"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109945851/"
},
{
"category": "workaround",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2021-28831"
},
{
"cve": "CVE-2021-33574",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"notes": [
{
"category": "summary",
"text": "The mq_notify function in the GNU C Library (aka glibc) versions 2.32 and 2.33 has a use-after-free. It may use the notification thread attributes object (passed through its struct sigevent parameter) after it has been freed by the caller, leading to a denial of service (application crash) or possibly unspecified other impact.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V1.3.0 or later version",
"product_ids": [
"1"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109945851/"
},
{
"category": "workaround",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2021-33574"
},
{
"cve": "CVE-2021-35942",
"cwe": {
"id": "CWE-190",
"name": "Integer Overflow or Wraparound"
},
"notes": [
{
"category": "summary",
"text": "The wordexp function in the GNU C Library (aka glibc) through 2.33 may crash or read arbitrary memory in parse_param (in posix/wordexp.c) when called with an untrusted, crafted pattern, potentially resulting in a denial of service or disclosure of information. This occurs because atoi was used but strtoul should have been used to ensure correct calculations.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V1.3.0 or later version",
"product_ids": [
"1"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109945851/"
},
{
"category": "workaround",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.1,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2021-35942"
},
{
"cve": "CVE-2021-38604",
"cwe": {
"id": "CWE-476",
"name": "NULL Pointer Dereference"
},
"notes": [
{
"category": "summary",
"text": "In librt in the GNU C Library (aka glibc) through 2.34, sysdeps/unix/sysv/linux/mq_notify.c mishandles certain NOTIFY_REMOVED data, leading to a NULL pointer dereference. NOTE: this vulnerability was introduced as a side effect of the CVE-2021-33574 fix.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V1.3.0 or later version",
"product_ids": [
"1"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109945851/"
},
{
"category": "workaround",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2021-38604"
},
{
"cve": "CVE-2021-42373",
"cwe": {
"id": "CWE-476",
"name": "NULL Pointer Dereference"
},
"notes": [
{
"category": "summary",
"text": "A NULL pointer dereference in Busybox\u0027s man applet leads to denial of service when a section name is supplied but no page argument is given.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V1.3.0 or later version",
"product_ids": [
"1"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109945851/"
},
{
"category": "workaround",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.1,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2021-42373"
},
{
"cve": "CVE-2021-42374",
"cwe": {
"id": "CWE-125",
"name": "Out-of-bounds Read"
},
"notes": [
{
"category": "summary",
"text": "An out-of-bounds heap read in Busybox\u0027s unlzma applet leads to information leak and denial of service when crafted LZMA-compressed input is decompressed. This can be triggered by any applet/format that internally supports LZMA compression.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V1.3.0 or later version",
"product_ids": [
"1"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109945851/"
},
{
"category": "workaround",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2021-42374"
},
{
"cve": "CVE-2021-42375",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "summary",
"text": "An incorrect handling of a special element in Busybox\u0027s ash applet leads to denial of service when processing a crafted shell command, due to the shell mistaking specific characters for reserved characters. This may be used for DoS under rare conditions of filtered command input.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V1.3.0 or later version",
"product_ids": [
"1"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109945851/"
},
{
"category": "workaround",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.1,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2021-42375"
},
{
"cve": "CVE-2021-42376",
"cwe": {
"id": "CWE-476",
"name": "NULL Pointer Dereference"
},
"notes": [
{
"category": "summary",
"text": "A NULL pointer dereference in Busybox\u0027s hush applet leads to denial of service when processing a crafted shell command, due to missing validation after a \\x03 delimiter character. This may be used for DoS under very rare conditions of filtered command input.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V1.3.0 or later version",
"product_ids": [
"1"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109945851/"
},
{
"category": "workaround",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.1,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2021-42376"
},
{
"cve": "CVE-2021-42377",
"cwe": {
"id": "CWE-763",
"name": "Release of Invalid Pointer or Reference"
},
"notes": [
{
"category": "summary",
"text": "An attacker-controlled pointer free in Busybox\u0027s hush applet leads to denial of service and possible code execution when processing a crafted shell command, due to the shell mishandling the \u0026\u0026\u0026 string. This may be used for remote code execution under rare conditions of filtered command input.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V1.3.0 or later version",
"product_ids": [
"1"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109945851/"
},
{
"category": "workaround",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2021-42377"
},
{
"cve": "CVE-2021-42378",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"notes": [
{
"category": "summary",
"text": "A use-after-free in Busybox\u0027s awk applet leads to denial of service and possibly code execution when processing a crafted awk pattern in the getvar_i function.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V1.3.0 or later version",
"product_ids": [
"1"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109945851/"
},
{
"category": "workaround",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.6,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2021-42378"
},
{
"cve": "CVE-2021-42379",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"notes": [
{
"category": "summary",
"text": "A use-after-free in Busybox\u0027s awk applet leads to denial of service and possibly code execution when processing a crafted awk pattern in the next_input_file function.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V1.3.0 or later version",
"product_ids": [
"1"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109945851/"
},
{
"category": "workaround",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.6,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2021-42379"
},
{
"cve": "CVE-2021-42380",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"notes": [
{
"category": "summary",
"text": "A use-after-free in awk leads to denial of service and possibly code execution when processing a crafted awk pattern in the clrvar function.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V1.3.0 or later version",
"product_ids": [
"1"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109945851/"
},
{
"category": "workaround",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.6,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2021-42380"
},
{
"cve": "CVE-2021-42381",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"notes": [
{
"category": "summary",
"text": "A use-after-free in awk leads to denial of service and possibly code execution when processing a crafted awk pattern in the hash_init function.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V1.3.0 or later version",
"product_ids": [
"1"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109945851/"
},
{
"category": "workaround",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.6,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2021-42381"
},
{
"cve": "CVE-2021-42382",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"notes": [
{
"category": "summary",
"text": "A use-after-free in awk leads to denial of service and possibly code execution when processing a crafted awk pattern in the getvar_s function.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V1.3.0 or later version",
"product_ids": [
"1"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109945851/"
},
{
"category": "workaround",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.6,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2021-42382"
},
{
"cve": "CVE-2021-42383",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"notes": [
{
"category": "summary",
"text": "A use-after-free in awk leads to denial of service and possibly code execution when processing a crafted awk pattern in the evaluate function.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V1.3.0 or later version",
"product_ids": [
"1"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109945851/"
},
{
"category": "workaround",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.6,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2021-42383"
},
{
"cve": "CVE-2021-42384",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"notes": [
{
"category": "summary",
"text": "A use-after-free in Busybox\u0027s awk applet leads to denial of service and possibly code execution when processing a crafted awk pattern in the handle_special function.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V1.3.0 or later version",
"product_ids": [
"1"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109945851/"
},
{
"category": "workaround",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.6,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2021-42384"
},
{
"cve": "CVE-2021-42385",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"notes": [
{
"category": "summary",
"text": "A use-after-free in awk leads to denial of service and possibly code execution when processing a crafted awk pattern in the evaluate function.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V1.3.0 or later version",
"product_ids": [
"1"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109945851/"
},
{
"category": "workaround",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.6,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2021-42385"
},
{
"cve": "CVE-2021-42386",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"notes": [
{
"category": "summary",
"text": "A use-after-free in awk leads to denial of service and possibly code execution when processing a crafted awk pattern in the nvalloc function.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V1.3.0 or later version",
"product_ids": [
"1"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109945851/"
},
{
"category": "workaround",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.6,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2021-42386"
},
{
"cve": "CVE-2021-44879",
"cwe": {
"id": "CWE-476",
"name": "NULL Pointer Dereference"
},
"notes": [
{
"category": "summary",
"text": "In gc_data_segment in fs/f2fs/gc.c in the Linux kernel before 5.16.3, special files are not considered, leading to a move_data_page NULL pointer dereference.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V1.3.0 or later version",
"product_ids": [
"1"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109945851/"
},
{
"category": "workaround",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2021-44879"
},
{
"cve": "CVE-2022-1015",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"notes": [
{
"category": "summary",
"text": "A flaw was found in the Linux kernel in linux/net/netfilter/nf_tables_api.c of the netfilter subsystem. This flaw allows a local user to cause an out-of-bounds write issue.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V1.3.0 or later version",
"product_ids": [
"1"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109945851/"
},
{
"category": "workaround",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.6,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2022-1015"
},
{
"cve": "CVE-2022-1882",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"notes": [
{
"category": "summary",
"text": "A use-after-free flaw was found in the Linux kernel\u2019s pipes functionality in how a user performs manipulations with the pipe post_one_notification() after free_pipe_info() that is already called. This flaw allows a local user to crash or potentially escalate their privileges on the system.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V1.3.0 or later version",
"product_ids": [
"1"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109945851/"
},
{
"category": "workaround",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2022-1882"
},
{
"cve": "CVE-2022-2585",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"notes": [
{
"category": "summary",
"text": "A use-after-free flaw was found in the Linux kernel\u2019s POSIX CPU timers functionality in the way a user creates and then deletes the timer in the non-leader thread of the program. This flaw allows a local user to crash or potentially escalate their privileges on the system.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V1.3.0 or later version",
"product_ids": [
"1"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109945851/"
},
{
"category": "workaround",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2022-2585"
},
{
"cve": "CVE-2022-2588",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "summary",
"text": "Zhenpeng Lin discovered that the network packet scheduler implementation in the Linux kernel did not properly remove all references to a route filter before freeing it in some situations. A local attacker could use this to cause a denial of service (system crash) or execute arbitrary code.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V1.3.0 or later version",
"product_ids": [
"1"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109945851/"
},
{
"category": "workaround",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2022-2588"
},
{
"cve": "CVE-2022-2905",
"cwe": {
"id": "CWE-125",
"name": "Out-of-bounds Read"
},
"notes": [
{
"category": "summary",
"text": "An out-of-bounds memory read flaw was found in the Linux kernel\u0027s BPF subsystem in how a user calls the bpf_tail_call function with a key larger than the max_entries of the map. This flaw allows a local user to gain unauthorized access to data.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V1.3.0 or later version",
"product_ids": [
"1"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109945851/"
},
{
"category": "workaround",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2022-2905"
},
{
"cve": "CVE-2022-3028",
"cwe": {
"id": "CWE-362",
"name": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)"
},
"notes": [
{
"category": "summary",
"text": "A race condition was found in the Linux kernel\u0027s IP framework for transforming packets (XFRM subsystem) when multiple calls to xfrm_probe_algs occurred simultaneously. This flaw could allow a local attacker to potentially trigger an out-of-bounds write or leak kernel heap memory by performing an out-of-bounds read and copying it into a socket.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V1.3.0 or later version",
"product_ids": [
"1"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109945851/"
},
{
"category": "workaround",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.0,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2022-3028"
},
{
"cve": "CVE-2022-3435",
"cwe": {
"id": "CWE-119",
"name": "Improper Restriction of Operations within the Bounds of a Memory Buffer"
},
"notes": [
{
"category": "summary",
"text": "A vulnerability classified as problematic has been found in Linux Kernel. This affects the function fib_nh_match of the file net/ipv4/fib_semantics.c of the component IPv4 Handler. The manipulation leads to out-of-bounds read. It is possible to initiate the attack remotely. It is recommended to apply a patch to fix this issue. The identifier VDB-210357 was assigned to this vulnerability.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V1.3.0 or later version",
"product_ids": [
"1"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109945851/"
},
{
"category": "workaround",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2022-3435"
},
{
"cve": "CVE-2022-3586",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"notes": [
{
"category": "summary",
"text": "A flaw was found in the Linux kernel\u2019s networking code. A use-after-free was found in the way the sch_sfb enqueue function used the socket buffer (SKB) cb field after the same SKB had been enqueued (and freed) into a child qdisc. This flaw allows a local, unprivileged user to crash the system, causing a denial of service.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V1.3.0 or later version",
"product_ids": [
"1"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109945851/"
},
{
"category": "workaround",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2022-3586"
},
{
"cve": "CVE-2022-4378",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"notes": [
{
"category": "summary",
"text": "A stack overflow flaw was found in the Linux kernel\u0027s SYSCTL subsystem in how a user changes certain kernel parameters and variables. This flaw allows a local user to crash or potentially escalate their privileges on the system.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V1.3.0 or later version",
"product_ids": [
"1"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109945851/"
},
{
"category": "workaround",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2022-4378"
},
{
"cve": "CVE-2022-4662",
"cwe": {
"id": "CWE-455",
"name": "Non-exit on Failed Initialization"
},
"notes": [
{
"category": "summary",
"text": "A flaw incorrect access control in the Linux kernel USB core subsystem was found in the way user attaches usb device. A local user could use this flaw to crash the system.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V1.3.0 or later version",
"product_ids": [
"1"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109945851/"
},
{
"category": "workaround",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2022-4662"
},
{
"cve": "CVE-2022-20421",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"notes": [
{
"category": "summary",
"text": "In binder_inc_ref_for_node of binder.c, there is a possible way to corrupt memory due to a use after free. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-239630375References: Upstream kernel",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V1.3.0 or later version",
"product_ids": [
"1"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109945851/"
},
{
"category": "workaround",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2022-20421"
},
{
"cve": "CVE-2022-20422",
"cwe": {
"id": "CWE-362",
"name": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)"
},
"notes": [
{
"category": "summary",
"text": "In emulation_proc_handler of armv8_deprecated.c, there is a possible way to corrupt memory due to a race condition. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-237540956References: Upstream kernel",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V1.3.0 or later version",
"product_ids": [
"1"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109945851/"
},
{
"category": "workaround",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.0,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2022-20422"
},
{
"cve": "CVE-2022-21233",
"cwe": {
"id": "CWE-311",
"name": "Missing Encryption of Sensitive Data"
},
"notes": [
{
"category": "summary",
"text": "Improper isolation of shared resources in some Intel(R) Processors may allow a privileged user to potentially enable information disclosure via local access.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V1.3.0 or later version",
"product_ids": [
"1"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109945851/"
},
{
"category": "workaround",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2022-21233"
},
{
"cve": "CVE-2022-23218",
"cwe": {
"id": "CWE-120",
"name": "Buffer Copy without Checking Size of Input (\u0027Classic Buffer Overflow\u0027)"
},
"notes": [
{
"category": "summary",
"text": "The deprecated compatibility function svcunix_create in the sunrpc module of the GNU C Library (aka glibc) through 2.34 copies its path argument on the stack without validating its length, which may result in a buffer overflow, potentially resulting in a denial of service or (if an application is not built with a stack protector enabled) arbitrary code execution.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V1.3.0 or later version",
"product_ids": [
"1"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109945851/"
},
{
"category": "workaround",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2022-23218"
},
{
"cve": "CVE-2022-23219",
"cwe": {
"id": "CWE-120",
"name": "Buffer Copy without Checking Size of Input (\u0027Classic Buffer Overflow\u0027)"
},
"notes": [
{
"category": "summary",
"text": "The deprecated compatibility function clnt_create in the sunrpc module of the GNU C Library (aka glibc) through 2.34 copies its hostname argument on the stack without validating its length, which may result in a buffer overflow, potentially resulting in a denial of service or (if an application is not built with a stack protector enabled) arbitrary code execution.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V1.3.0 or later version",
"product_ids": [
"1"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109945851/"
},
{
"category": "workaround",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2022-23219"
},
{
"cve": "CVE-2022-28391",
"cwe": {
"id": "CWE-311",
"name": "Missing Encryption of Sensitive Data"
},
"notes": [
{
"category": "summary",
"text": "BusyBox through 1.35.0 allows remote attackers to execute arbitrary code if netstat is used to print a DNS PTR record\u0027s value to a VT compatible terminal. Alternatively, the attacker could choose to change the terminal\u0027s colors.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V1.3.0 or later version",
"product_ids": [
"1"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109945851/"
},
{
"category": "workaround",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2022-28391"
},
{
"cve": "CVE-2022-30065",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"notes": [
{
"category": "summary",
"text": "A use-after-free in Busybox 1.35-x\u0027s awk applet leads to denial of service and possibly code execution when processing a crafted awk pattern in the copyvar function.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V1.3.0 or later version",
"product_ids": [
"1"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109945851/"
},
{
"category": "workaround",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2022-30065"
},
{
"cve": "CVE-2022-39188",
"cwe": {
"id": "CWE-362",
"name": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)"
},
"notes": [
{
"category": "summary",
"text": "An issue was discovered in include/asm-generic/tlb.h in the Linux kernel before 5.19. Because of a race condition (unmap_mapping_range versus munmap), a device driver can free a page while it still has stale TLB entries. This only occurs in situations with VM_PFNMAP VMAs.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V1.3.0 or later version",
"product_ids": [
"1"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109945851/"
},
{
"category": "workaround",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2022-39188"
},
{
"cve": "CVE-2022-39190",
"cwe": {
"id": "CWE-400",
"name": "Uncontrolled Resource Consumption"
},
"notes": [
{
"category": "summary",
"text": "An issue was discovered in net/netfilter/nf_tables_api.c in the Linux kernel before 5.19.6. A denial of service can occur upon binding to an already bound chain.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V1.3.0 or later version",
"product_ids": [
"1"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109945851/"
},
{
"category": "workaround",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2022-39190"
},
{
"cve": "CVE-2022-40307",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"notes": [
{
"category": "summary",
"text": "An issue was discovered in the Linux kernel through 5.19.8. drivers/firmware/efi/capsule-loader.c has a race condition with a resultant use-after-free.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V1.3.0 or later version",
"product_ids": [
"1"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109945851/"
},
{
"category": "workaround",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2022-40307"
},
{
"cve": "CVE-2022-41222",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"notes": [
{
"category": "summary",
"text": "mm/mremap.c in the Linux kernel before 5.13.3 has a use-after-free via a stale TLB because an rmap lock is not held during a PUD move.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V1.3.0 or later version",
"product_ids": [
"1"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109945851/"
},
{
"category": "workaround",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.0,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2022-41222"
},
{
"cve": "CVE-2022-42703",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"notes": [
{
"category": "summary",
"text": "mm/rmap.c in the Linux kernel before 5.19.7 has a use-after-free related to leaf anon_vma double reuse.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V1.3.0 or later version",
"product_ids": [
"1"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109945851/"
},
{
"category": "workaround",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2022-42703"
},
{
"cve": "CVE-2023-0179",
"cwe": {
"id": "CWE-190",
"name": "Integer Overflow or Wraparound"
},
"notes": [
{
"category": "summary",
"text": "A buffer overflow vulnerability was found in the Netfilter subsystem in the Linux Kernel. This issue could allow the leakage of both stack and heap addresses, and potentially allow Local Privilege Escalation to the root user via arbitrary code execution.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V1.3.0 or later version",
"product_ids": [
"1"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109945851/"
},
{
"category": "workaround",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2023-0179"
},
{
"cve": "CVE-2023-0394",
"cwe": {
"id": "CWE-311",
"name": "Missing Encryption of Sensitive Data"
},
"notes": [
{
"category": "summary",
"text": "A NULL pointer dereference flaw was found in rawv6_push_pending_frames in net/ipv6/raw.c in the network subcomponent in the Linux kernel. This flaw causes the system to crash.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V1.3.0 or later version",
"product_ids": [
"1"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109945851/"
},
{
"category": "workaround",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2023-0394"
},
{
"cve": "CVE-2023-1073",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"notes": [
{
"category": "summary",
"text": "A memory corruption flaw was found in the Linux kernel\u2019s human interface device (HID) subsystem in how a user inserts a malicious USB device. This flaw allows a local user to crash or potentially escalate their privileges on the system.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V1.3.0 or later version",
"product_ids": [
"1"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109945851/"
},
{
"category": "workaround",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.6,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2023-1073"
},
{
"cve": "CVE-2023-2898",
"cwe": {
"id": "CWE-476",
"name": "NULL Pointer Dereference"
},
"notes": [
{
"category": "summary",
"text": "There is a null-pointer-dereference flaw found in f2fs_write_end_io in fs/f2fs/data.c in the Linux kernel. This flaw allows a local privileged user to cause a denial of service problem.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V1.3.0 or later version",
"product_ids": [
"1"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109945851/"
},
{
"category": "workaround",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2023-2898"
},
{
"cve": "CVE-2023-3390",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"notes": [
{
"category": "summary",
"text": "A use-after-free vulnerability was found in the Linux kernel\u0027s netfilter subsystem in net/netfilter/nf_tables_api.c.\n\nMishandled error handling with NFT_MSG_NEWRULE makes it possible to use a dangling pointer in the same transaction causing a use-after-free vulnerability. This flaw allows a local attacker with user access to cause a privilege escalation issue.\n\nWe recommend upgrading past commit\u00a01240eb93f0616b21c675416516ff3d74798fdc97.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V1.3.0 or later version",
"product_ids": [
"1"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109945851/"
},
{
"category": "workaround",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2023-3390"
},
{
"cve": "CVE-2023-3610",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"notes": [
{
"category": "summary",
"text": "A use-after-free vulnerability in the Linux kernel\u0027s netfilter: nf_tables component can be exploited to achieve local privilege escalation.\r\n\r\nFlaw in the error handling of bound chains causes a use-after-free in the abort path of NFT_MSG_NEWRULE. The vulnerability requires CAP_NET_ADMIN to be triggered.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V1.3.0 or later version",
"product_ids": [
"1"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109945851/"
},
{
"category": "workaround",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2023-3610"
},
{
"cve": "CVE-2023-3611",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"notes": [
{
"category": "summary",
"text": "An out-of-bounds write vulnerability in the Linux kernel\u0027s net/sched: sch_qfq component can be exploited to achieve local privilege escalation.\r\n\r\nThe qfq_change_agg() function in net/sched/sch_qfq.c allows an out-of-bounds write because lmax is updated according to packet sizes without bounds checks.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V1.3.0 or later version",
"product_ids": [
"1"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109945851/"
},
{
"category": "workaround",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2023-3611"
},
{
"cve": "CVE-2023-3776",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"notes": [
{
"category": "summary",
"text": "A use-after-free vulnerability in the Linux kernel\u0027s net/sched: cls_fw component can be exploited to achieve local privilege escalation.\r\n\r\nIf tcf_change_indev() fails, fw_set_parms() will immediately return an error after incrementing or decrementing the reference counter in tcf_bind_filter(). If an attacker can control the reference counter and set it to zero, they can cause the reference to be freed, leading to a use-after-free vulnerability.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V1.3.0 or later version",
"product_ids": [
"1"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109945851/"
},
{
"category": "workaround",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2023-3776"
},
{
"cve": "CVE-2023-4004",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "summary",
"text": "A use-after-free flaw was found in the Linux kernel\u0027s netfilter in the way a user triggers the nft_pipapo_remove function with the element, without a NFT_SET_EXT_KEY_END. This issue could allow a local user to crash the system or potentially escalate their privileges on the system.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V1.3.0 or later version",
"product_ids": [
"1"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109945851/"
},
{
"category": "workaround",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2023-4004"
},
{
"cve": "CVE-2023-4015",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "summary",
"text": "The netfilter subsystem in the Linux kernel did not properly handle bound chain deactivation in certain circumstances. A local attacker could possibly use this to cause a denial of service (system crash) or execute arbitrary code.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V1.3.0 or later version",
"product_ids": [
"1"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109945851/"
},
{
"category": "workaround",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.4,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2023-4015"
},
{
"cve": "CVE-2023-4128",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"notes": [
{
"category": "summary",
"text": "A use-after-free vulnerability in net/sched/cls_fw.c in classifiers (cls_fw, cls_u32, and cls_route) in the Linux Kernel allows a local attacker to perform a local privilege escalation due to incorrect handling of the existing filter, leading to a kernel information leak.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V1.3.0 or later version",
"product_ids": [
"1"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109945851/"
},
{
"category": "workaround",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2023-4128"
},
{
"cve": "CVE-2023-4147",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"notes": [
{
"category": "summary",
"text": "A use-after-free vulnerability in the Linux kernel\u2019s Netfilter functionality when adding a rule with NFTA_RULE_CHAIN_ID allows a local user to crash or escalate their privileges on the system.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V1.3.0 or later version",
"product_ids": [
"1"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109945851/"
},
{
"category": "workaround",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2023-4147"
},
{
"cve": "CVE-2023-4273",
"cwe": {
"id": "CWE-121",
"name": "Stack-based Buffer Overflow"
},
"notes": [
{
"category": "summary",
"text": "This vulnerability exists in the implementation of the file name reconstruction function, which is responsible for reading file name entries from a directory index and merging file name parts belonging to one file into a single long file name. Since the file name characters are copied into a stack variable, a local privileged attacker could use this vulnerability to overflow the kernel stack.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V1.3.0 or later version",
"product_ids": [
"1"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109945851/"
},
{
"category": "workaround",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.0,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N/E:U/RL:O/RC:C",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2023-4273"
},
{
"cve": "CVE-2023-4527",
"cwe": {
"id": "CWE-125",
"name": "Out-of-bounds Read"
},
"notes": [
{
"category": "summary",
"text": "A flaw was found in glibc. When the getaddrinfo function is called with the AF_UNSPEC address family and the system is configured with no-aaaa mode via /etc/resolv.conf, a DNS response via TCP larger than 2048 bytes can potentially disclose stack contents through the function returned address data, and may cause a crash.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V1.3.0 or later version",
"product_ids": [
"1"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109945851/"
},
{
"category": "workaround",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:H",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2023-4527"
},
{
"cve": "CVE-2023-4806",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"notes": [
{
"category": "summary",
"text": "A flaw was found in glibc. In an extremely rare situation, the getaddrinfo function may access memory that has been freed, resulting in an application crash. This issue is only exploitable when a NSS module implements only the _nss_*_gethostbyname2_r and _nss_*_getcanonname_r hooks without implementing the _nss_*_gethostbyname3_r hook. The resolved name should return a large number of IPv6 and IPv4, and the call to the getaddrinfo function should have the AF_INET6 address family with AI_CANONNAME, AI_ALL and AI_V4MAPPED as flags.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V1.3.0 or later version",
"product_ids": [
"1"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109945851/"
},
{
"category": "workaround",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2023-4806"
},
{
"cve": "CVE-2023-4911",
"cwe": {
"id": "CWE-121",
"name": "Stack-based Buffer Overflow"
},
"notes": [
{
"category": "summary",
"text": "A buffer overflow was discovered in the GNU C Library\u0027s dynamic loader ld.so while processing the GLIBC_TUNABLES environment variable. This issue could allow a local attacker to use maliciously crafted GLIBC_TUNABLES environment variables when launching binaries with SUID permission to execute code with elevated privileges.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V1.3.0 or later version",
"product_ids": [
"1"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109945851/"
},
{
"category": "workaround",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2023-4911"
},
{
"cve": "CVE-2023-5156",
"cwe": {
"id": "CWE-401",
"name": "Missing Release of Memory after Effective Lifetime"
},
"notes": [
{
"category": "summary",
"text": "A flaw was found in the GNU C Library. A recent fix for CVE-2023-4806 introduced the potential for a memory leak, which may result in an application crash.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V1.3.0 or later version",
"product_ids": [
"1"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109945851/"
},
{
"category": "workaround",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2023-5156"
},
{
"cve": "CVE-2023-31248",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"notes": [
{
"category": "summary",
"text": "Linux Kernel nftables Use-After-Free Local Privilege Escalation Vulnerability; `nft_chain_lookup_byid()` failed to check whether a chain was active and CAP_NET_ADMIN is in any user or network namespace",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V1.3.0 or later version",
"product_ids": [
"1"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109945851/"
},
{
"category": "workaround",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2023-31248"
},
{
"cve": "CVE-2023-35001",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"notes": [
{
"category": "summary",
"text": "Linux Kernel nftables Out-Of-Bounds Read/Write Vulnerability; nft_byteorder poorly handled vm register contents when CAP_NET_ADMIN is in any user or network namespace",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V1.3.0 or later version",
"product_ids": [
"1"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109945851/"
},
{
"category": "workaround",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2023-35001"
},
{
"cve": "CVE-2023-45863",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"notes": [
{
"category": "summary",
"text": "An issue was discovered in lib/kobject.c in the Linux kernel before 6.2.3. With root access, an attacker can trigger a race condition that results in a fill_kobj_path out-of-bounds write.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V1.3.0 or later version",
"product_ids": [
"1"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109945851/"
},
{
"category": "workaround",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2023-45863"
}
]
}
SSA-942865
Vulnerability from csaf_siemens - Published: 2023-06-13 00:00 - Updated: 2023-06-14 00:00Notes
{
"document": {
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Disclosure is not limited. (TLPv2: TLP:CLEAR)",
"tlp": {
"label": "WHITE"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "SINAMICS PERFECT HARMONY GH180 is affected by multiple vulnerabilities in the integrated SCALANCE S615 device, as documented in SSA-419740 (\nhttps://cert-portal.siemens.com/productcert/html/ssa-419740.html).\nSiemens recommends to update the firmware of the integrated SCALANCE S615 device to the latest version. Siemens recommends specific countermeasures for products where the firmware update is not, or not yet applied.\n\nAdditional considerations regarding the specific impact of the vulnerabilities to SINAMICS MV products can be found in the chapter \"Additional Information\".",
"title": "Summary"
},
{
"category": "general",
"text": "As a general security measure, Siemens strongly recommends to protect network access to devices with appropriate mechanisms. In order to operate the devices in a protected IT environment, Siemens recommends to configure the environment according to Siemens\u0027 operational guidelines for Industrial Security (Download: \nhttps://www.siemens.com/cert/operational-guidelines-industrial-security), and to follow the recommendations in the product manuals.\nAdditional information on Industrial Security by Siemens can be found at: https://www.siemens.com/industrialsecurity",
"title": "General Recommendations"
},
{
"category": "general",
"text": "For further inquiries on security vulnerabilities in Siemens products and solutions, please contact the Siemens ProductCERT: https://www.siemens.com/cert/advisories",
"title": "Additional Resources"
},
{
"category": "legal_disclaimer",
"text": "Siemens Security Advisories are subject to the terms and conditions contained in Siemens\u0027 underlying license terms or other applicable agreements previously agreed to with Siemens (hereinafter \"License Terms\"). To the extent applicable to information, software or documentation made available in or through a Siemens Security Advisory, the Terms of Use of Siemens\u0027 Global Website (https://www.siemens.com/terms_of_use, hereinafter \"Terms of Use\"), in particular Sections 8-10 of the Terms of Use, shall apply additionally. In case of conflicts, the License Terms shall prevail over the Terms of Use.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "productcert@siemens.com",
"name": "Siemens ProductCERT",
"namespace": "https://www.siemens.com"
},
"references": [
{
"category": "self",
"summary": "SSA-942865: Multiple Vulnerabilities in the Integrated SCALANCE S615 of SINAMICS Medium Voltage Products - HTML Version",
"url": "https://cert-portal.siemens.com/productcert/html/ssa-942865.html"
},
{
"category": "self",
"summary": "SSA-942865: Multiple Vulnerabilities in the Integrated SCALANCE S615 of SINAMICS Medium Voltage Products - CSAF Version",
"url": "https://cert-portal.siemens.com/productcert/csaf/ssa-942865.json"
},
{
"category": "self",
"summary": "SSA-942865: Multiple Vulnerabilities in the Integrated SCALANCE S615 of SINAMICS Medium Voltage Products - PDF Version",
"url": "https://cert-portal.siemens.com/productcert/pdf/ssa-942865.pdf"
},
{
"category": "self",
"summary": "SSA-942865: Multiple Vulnerabilities in the Integrated SCALANCE S615 of SINAMICS Medium Voltage Products - TXT Version",
"url": "https://cert-portal.siemens.com/productcert/txt/ssa-942865.txt"
}
],
"title": "SSA-942865: Multiple Vulnerabilities in the Integrated SCALANCE S615 of SINAMICS Medium Voltage Products",
"tracking": {
"current_release_date": "2023-06-14T00:00:00Z",
"generator": {
"engine": {
"name": "Siemens ProductCERT CSAF Generator",
"version": "1"
}
},
"id": "SSA-942865",
"initial_release_date": "2023-06-13T00:00:00Z",
"revision_history": [
{
"date": "2023-06-13T00:00:00Z",
"legacy_version": "1.0",
"number": "1",
"summary": "Publication Date"
},
{
"date": "2023-06-14T00:00:00Z",
"legacy_version": "1.1",
"number": "2",
"summary": "Removed not affected products SINAMICS GL150 and SINAMICS SL150"
}
],
"status": "final",
"version": "2"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/*",
"product": {
"name": "SINAMICS PERFECT HARMONY GH180 6SR5",
"product_id": "1"
}
}
],
"category": "product_name",
"name": "SINAMICS PERFECT HARMONY GH180 6SR5"
}
],
"category": "vendor",
"name": "Siemens"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2018-25032",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"notes": [
{
"category": "summary",
"text": "zlib before 1.2.12 allows memory corruption when deflating (i.e., when compressing) if the input has many distant matches.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Restrict physical access to the affected drives, also to their Ethernet Port included on the front of the control door",
"product_ids": [
"1"
]
},
{
"category": "mitigation",
"details": "Disconnect any direct network connection to the integrated SCALANCE S615 device",
"product_ids": [
"1"
]
},
{
"category": "vendor_fix",
"details": "Update the firmware of the integrated SCALANCE S615 device to V7.2 or later version",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2018-25032"
},
{
"cve": "CVE-2021-42374",
"cwe": {
"id": "CWE-125",
"name": "Out-of-bounds Read"
},
"notes": [
{
"category": "summary",
"text": "An out-of-bounds heap read in Busybox\u0027s unlzma applet leads to information leak and denial of service when crafted LZMA-compressed input is decompressed. This can be triggered by any applet/format that internally supports LZMA compression.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Restrict physical access to the affected drives, also to their Ethernet Port included on the front of the control door",
"product_ids": [
"1"
]
},
{
"category": "mitigation",
"details": "Disconnect any direct network connection to the integrated SCALANCE S615 device",
"product_ids": [
"1"
]
},
{
"category": "vendor_fix",
"details": "Update the firmware of the integrated SCALANCE S615 device to V7.2 or later version",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2021-42374"
},
{
"cve": "CVE-2021-42378",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"notes": [
{
"category": "summary",
"text": "A use-after-free in Busybox\u0027s awk applet leads to denial of service and possibly code execution when processing a crafted awk pattern in the getvar_i function.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Restrict physical access to the affected drives, also to their Ethernet Port included on the front of the control door",
"product_ids": [
"1"
]
},
{
"category": "mitigation",
"details": "Disconnect any direct network connection to the integrated SCALANCE S615 device",
"product_ids": [
"1"
]
},
{
"category": "vendor_fix",
"details": "Update the firmware of the integrated SCALANCE S615 device to V7.2 or later version",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.6,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2021-42378"
},
{
"cve": "CVE-2021-42379",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"notes": [
{
"category": "summary",
"text": "A use-after-free in Busybox\u0027s awk applet leads to denial of service and possibly code execution when processing a crafted awk pattern in the next_input_file function.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Restrict physical access to the affected drives, also to their Ethernet Port included on the front of the control door",
"product_ids": [
"1"
]
},
{
"category": "mitigation",
"details": "Disconnect any direct network connection to the integrated SCALANCE S615 device",
"product_ids": [
"1"
]
},
{
"category": "vendor_fix",
"details": "Update the firmware of the integrated SCALANCE S615 device to V7.2 or later version",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.6,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2021-42379"
},
{
"cve": "CVE-2021-42380",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"notes": [
{
"category": "summary",
"text": "A use-after-free in awk leads to denial of service and possibly code execution when processing a crafted awk pattern in the clrvar function.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Restrict physical access to the affected drives, also to their Ethernet Port included on the front of the control door",
"product_ids": [
"1"
]
},
{
"category": "mitigation",
"details": "Disconnect any direct network connection to the integrated SCALANCE S615 device",
"product_ids": [
"1"
]
},
{
"category": "vendor_fix",
"details": "Update the firmware of the integrated SCALANCE S615 device to V7.2 or later version",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.6,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2021-42380"
},
{
"cve": "CVE-2021-42381",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"notes": [
{
"category": "summary",
"text": "A use-after-free in awk leads to denial of service and possibly code execution when processing a crafted awk pattern in the hash_init function.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Restrict physical access to the affected drives, also to their Ethernet Port included on the front of the control door",
"product_ids": [
"1"
]
},
{
"category": "mitigation",
"details": "Disconnect any direct network connection to the integrated SCALANCE S615 device",
"product_ids": [
"1"
]
},
{
"category": "vendor_fix",
"details": "Update the firmware of the integrated SCALANCE S615 device to V7.2 or later version",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.6,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2021-42381"
},
{
"cve": "CVE-2021-42382",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"notes": [
{
"category": "summary",
"text": "A use-after-free in awk leads to denial of service and possibly code execution when processing a crafted awk pattern in the getvar_s function.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Restrict physical access to the affected drives, also to their Ethernet Port included on the front of the control door",
"product_ids": [
"1"
]
},
{
"category": "mitigation",
"details": "Disconnect any direct network connection to the integrated SCALANCE S615 device",
"product_ids": [
"1"
]
},
{
"category": "vendor_fix",
"details": "Update the firmware of the integrated SCALANCE S615 device to V7.2 or later version",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.6,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2021-42382"
},
{
"cve": "CVE-2021-42383",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"notes": [
{
"category": "summary",
"text": "A use-after-free in awk leads to denial of service and possibly code execution when processing a crafted awk pattern in the evaluate function.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Restrict physical access to the affected drives, also to their Ethernet Port included on the front of the control door",
"product_ids": [
"1"
]
},
{
"category": "mitigation",
"details": "Disconnect any direct network connection to the integrated SCALANCE S615 device",
"product_ids": [
"1"
]
},
{
"category": "vendor_fix",
"details": "Update the firmware of the integrated SCALANCE S615 device to V7.2 or later version",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.6,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2021-42383"
},
{
"cve": "CVE-2021-42384",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"notes": [
{
"category": "summary",
"text": "A use-after-free in Busybox\u0027s awk applet leads to denial of service and possibly code execution when processing a crafted awk pattern in the handle_special function.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Restrict physical access to the affected drives, also to their Ethernet Port included on the front of the control door",
"product_ids": [
"1"
]
},
{
"category": "mitigation",
"details": "Disconnect any direct network connection to the integrated SCALANCE S615 device",
"product_ids": [
"1"
]
},
{
"category": "vendor_fix",
"details": "Update the firmware of the integrated SCALANCE S615 device to V7.2 or later version",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.6,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2021-42384"
},
{
"cve": "CVE-2021-42385",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"notes": [
{
"category": "summary",
"text": "A use-after-free in awk leads to denial of service and possibly code execution when processing a crafted awk pattern in the evaluate function.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Restrict physical access to the affected drives, also to their Ethernet Port included on the front of the control door",
"product_ids": [
"1"
]
},
{
"category": "mitigation",
"details": "Disconnect any direct network connection to the integrated SCALANCE S615 device",
"product_ids": [
"1"
]
},
{
"category": "vendor_fix",
"details": "Update the firmware of the integrated SCALANCE S615 device to V7.2 or later version",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.6,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2021-42385"
},
{
"cve": "CVE-2021-42386",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"notes": [
{
"category": "summary",
"text": "A use-after-free in awk leads to denial of service and possibly code execution when processing a crafted awk pattern in the nvalloc function.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Restrict physical access to the affected drives, also to their Ethernet Port included on the front of the control door",
"product_ids": [
"1"
]
},
{
"category": "mitigation",
"details": "Disconnect any direct network connection to the integrated SCALANCE S615 device",
"product_ids": [
"1"
]
},
{
"category": "vendor_fix",
"details": "Update the firmware of the integrated SCALANCE S615 device to V7.2 or later version",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.6,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2021-42386"
},
{
"cve": "CVE-2022-0547",
"cwe": {
"id": "CWE-287",
"name": "Improper Authentication"
},
"notes": [
{
"category": "summary",
"text": "OpenVPN 2.1 until v2.4.12 and v2.5.6 may enable authentication bypass in external authentication plug-ins when more than one of them makes use of deferred authentication replies, which allows an external user to be granted access with only partially correct credentials.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Restrict physical access to the affected drives, also to their Ethernet Port included on the front of the control door",
"product_ids": [
"1"
]
},
{
"category": "mitigation",
"details": "Disconnect any direct network connection to the integrated SCALANCE S615 device",
"product_ids": [
"1"
]
},
{
"category": "vendor_fix",
"details": "Update the firmware of the integrated SCALANCE S615 device to V7.2 or later version",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2022-0547"
},
{
"cve": "CVE-2022-1199",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"notes": [
{
"category": "summary",
"text": "A flaw was found in the Linux kernel. This flaw allows an attacker to crash the Linux kernel by simulating amateur radio from the user space, resulting in a null-ptr-deref vulnerability and a use-after-free vulnerability.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Restrict physical access to the affected drives, also to their Ethernet Port included on the front of the control door",
"product_ids": [
"1"
]
},
{
"category": "mitigation",
"details": "Disconnect any direct network connection to the integrated SCALANCE S615 device",
"product_ids": [
"1"
]
},
{
"category": "vendor_fix",
"details": "Update the firmware of the integrated SCALANCE S615 device to V7.2 or later version",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2022-1199"
},
{
"cve": "CVE-2022-1292",
"cwe": {
"id": "CWE-78",
"name": "Improper Neutralization of Special Elements used in an OS Command (\u0027OS Command Injection\u0027)"
},
"notes": [
{
"category": "summary",
"text": "The c_rehash script does not properly sanitise shell metacharacters to prevent command injection.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Restrict physical access to the affected drives, also to their Ethernet Port included on the front of the control door",
"product_ids": [
"1"
]
},
{
"category": "mitigation",
"details": "Disconnect any direct network connection to the integrated SCALANCE S615 device",
"product_ids": [
"1"
]
},
{
"category": "vendor_fix",
"details": "Update the firmware of the integrated SCALANCE S615 device to V7.2 or later version",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2022-1292"
},
{
"cve": "CVE-2022-1343",
"cwe": {
"id": "CWE-295",
"name": "Improper Certificate Validation"
},
"notes": [
{
"category": "summary",
"text": "Under certain circumstances, the command line OCSP verify function reports successful verification when the verification in fact failed. In this case the incorrect successful response will also be accompanied by error messages showing the failure and contradicting the apparently successful result.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Restrict physical access to the affected drives, also to their Ethernet Port included on the front of the control door",
"product_ids": [
"1"
]
},
{
"category": "mitigation",
"details": "Disconnect any direct network connection to the integrated SCALANCE S615 device",
"product_ids": [
"1"
]
},
{
"category": "vendor_fix",
"details": "Update the firmware of the integrated SCALANCE S615 device to V7.2 or later version",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2022-1343"
},
{
"cve": "CVE-2022-1473",
"cwe": {
"id": "CWE-404",
"name": "Improper Resource Shutdown or Release"
},
"notes": [
{
"category": "summary",
"text": "The used OpenSSL version improperly reuses memory when decoding certificates or keys. This can lead to a process termination and Denial of Service for long lived processes.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Restrict physical access to the affected drives, also to their Ethernet Port included on the front of the control door",
"product_ids": [
"1"
]
},
{
"category": "mitigation",
"details": "Disconnect any direct network connection to the integrated SCALANCE S615 device",
"product_ids": [
"1"
]
},
{
"category": "vendor_fix",
"details": "Update the firmware of the integrated SCALANCE S615 device to V7.2 or later version",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2022-1473"
},
{
"cve": "CVE-2022-23308",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"notes": [
{
"category": "summary",
"text": "valid.c in libxml2 before 2.9.13 has a use-after-free of ID and IDREF attributes.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Restrict physical access to the affected drives, also to their Ethernet Port included on the front of the control door",
"product_ids": [
"1"
]
},
{
"category": "mitigation",
"details": "Disconnect any direct network connection to the integrated SCALANCE S615 device",
"product_ids": [
"1"
]
},
{
"category": "vendor_fix",
"details": "Update the firmware of the integrated SCALANCE S615 device to V7.2 or later version",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2022-23308"
},
{
"cve": "CVE-2022-32205",
"cwe": {
"id": "CWE-770",
"name": "Allocation of Resources Without Limits or Throttling"
},
"notes": [
{
"category": "summary",
"text": "A malicious server can serve excessive amounts of \"Set-Cookie:\" headers in a HTTP response to curl and curl \u003c 7.84.0 stores all of them. A sufficiently large amount of (big) cookies make subsequent HTTP requests to this, or other servers to which the cookies match, create requests that become larger than the threshold that curl uses internally to avoid sending crazy large requests (1048576 bytes) and instead returns an error.This denial state might remain for as long as the same cookies are kept, match and haven\u0027t expired. Due to cookie matching rules, a server on \"foo.example.com\" can set cookies that also would match for \"bar.example.com\", making it it possible for a \"sister server\" to effectively cause a denial of service for a sibling site on the same second level domain using this method.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Restrict physical access to the affected drives, also to their Ethernet Port included on the front of the control door",
"product_ids": [
"1"
]
},
{
"category": "mitigation",
"details": "Disconnect any direct network connection to the integrated SCALANCE S615 device",
"product_ids": [
"1"
]
},
{
"category": "vendor_fix",
"details": "Update the firmware of the integrated SCALANCE S615 device to V7.2 or later version",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2022-32205"
},
{
"cve": "CVE-2022-32206",
"cwe": {
"id": "CWE-770",
"name": "Allocation of Resources Without Limits or Throttling"
},
"notes": [
{
"category": "summary",
"text": "curl \u003c 7.84.0 supports \"chained\" HTTP compression algorithms, meaning that a serverresponse can be compressed multiple times and potentially with different algorithms. The number of acceptable \"links\" in this \"decompression chain\" was unbounded, allowing a malicious server to insert a virtually unlimited number of compression steps.The use of such a decompression chain could result in a \"malloc bomb\", makingcurl end up spending enormous amounts of allocated heap memory, or trying toand returning out of memory errors.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Restrict physical access to the affected drives, also to their Ethernet Port included on the front of the control door",
"product_ids": [
"1"
]
},
{
"category": "mitigation",
"details": "Disconnect any direct network connection to the integrated SCALANCE S615 device",
"product_ids": [
"1"
]
},
{
"category": "vendor_fix",
"details": "Update the firmware of the integrated SCALANCE S615 device to V7.2 or later version",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2022-32206"
},
{
"cve": "CVE-2022-32207",
"cwe": {
"id": "CWE-276",
"name": "Incorrect Default Permissions"
},
"notes": [
{
"category": "summary",
"text": "When curl \u003c 7.84.0 saves cookies, alt-svc and hsts data to local files, it makes the operation atomic by finalizing the operation with a rename from a temporary name to the final target file name.In that rename operation, it might accidentally *widen* the permissions for the target file, leaving the updated file accessible to more users than intended.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Restrict physical access to the affected drives, also to their Ethernet Port included on the front of the control door",
"product_ids": [
"1"
]
},
{
"category": "mitigation",
"details": "Disconnect any direct network connection to the integrated SCALANCE S615 device",
"product_ids": [
"1"
]
},
{
"category": "vendor_fix",
"details": "Update the firmware of the integrated SCALANCE S615 device to V7.2 or later version",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2022-32207"
},
{
"cve": "CVE-2022-32208",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"notes": [
{
"category": "summary",
"text": "When curl \u003c 7.84.0 does FTP transfers secured by krb5, it handles message verification failures wrongly. This flaw makes it possible for a Man-In-The-Middle attack to go unnoticed and even allows it to inject data to the client.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Restrict physical access to the affected drives, also to their Ethernet Port included on the front of the control door",
"product_ids": [
"1"
]
},
{
"category": "mitigation",
"details": "Disconnect any direct network connection to the integrated SCALANCE S615 device",
"product_ids": [
"1"
]
},
{
"category": "vendor_fix",
"details": "Update the firmware of the integrated SCALANCE S615 device to V7.2 or later version",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2022-32208"
},
{
"cve": "CVE-2022-35252",
"cwe": {
"id": "CWE-1286",
"name": "Improper Validation of Syntactic Correctness of Input"
},
"notes": [
{
"category": "summary",
"text": "When curl is used to retrieve and parse cookies from a HTTP(S) server, itaccepts cookies using control codes that when later are sent back to a HTTPserver might make the server return 400 responses. Effectively allowing a\"sister site\" to deny service to all siblings.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Restrict physical access to the affected drives, also to their Ethernet Port included on the front of the control door",
"product_ids": [
"1"
]
},
{
"category": "mitigation",
"details": "Disconnect any direct network connection to the integrated SCALANCE S615 device",
"product_ids": [
"1"
]
},
{
"category": "vendor_fix",
"details": "Update the firmware of the integrated SCALANCE S615 device to V7.2 or later version",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2022-35252"
},
{
"cve": "CVE-2022-36946",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "summary",
"text": "nfqnl_mangle in net/netfilter/nfnetlink_queue.c in the Linux kernel through 5.18.14 allows remote attackers to cause a denial of service (panic) because, in the case of an nf_queue verdict with a one-byte nfta_payload attribute, an skb_pull can encounter a negative skb-\u003elen.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Restrict physical access to the affected drives, also to their Ethernet Port included on the front of the control door",
"product_ids": [
"1"
]
},
{
"category": "mitigation",
"details": "Disconnect any direct network connection to the integrated SCALANCE S615 device",
"product_ids": [
"1"
]
},
{
"category": "vendor_fix",
"details": "Update the firmware of the integrated SCALANCE S615 device to V7.2 or later version",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2022-36946"
}
]
}
SSA-419740
Vulnerability from csaf_siemens - Published: 2023-03-14 00:00 - Updated: 2023-03-14 00:00Notes
{
"document": {
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Disclosure is not limited. (TLPv2: TLP:CLEAR)",
"tlp": {
"label": "WHITE"
}
},
"notes": [
{
"category": "summary",
"text": "Multiple third-party component vulnerabilities were reported for the Busybox applet, the Linux Kernel, OpenSSL, OpenVPN and various other components used by the RUGGEDCOM and SCALANCE products. The vulnerabilities range from improper neutralization of special elements to improper handling of commands under certain circumstances, that could lead to code injection and denial of service.\n\nSiemens has released updates for the affected products and recommends to update to the latest versions.",
"title": "Summary"
},
{
"category": "general",
"text": "As a general security measure, Siemens strongly recommends to protect network access to devices with appropriate mechanisms. In order to operate the devices in a protected IT environment, Siemens recommends to configure the environment according to Siemens\u0027 operational guidelines for Industrial Security (Download: \nhttps://www.siemens.com/cert/operational-guidelines-industrial-security), and to follow the recommendations in the product manuals.\nAdditional information on Industrial Security by Siemens can be found at: https://www.siemens.com/industrialsecurity",
"title": "General Recommendations"
},
{
"category": "general",
"text": "For further inquiries on security vulnerabilities in Siemens products and solutions, please contact the Siemens ProductCERT: https://www.siemens.com/cert/advisories",
"title": "Additional Resources"
},
{
"category": "legal_disclaimer",
"text": "Siemens Security Advisories are subject to the terms and conditions contained in Siemens\u0027 underlying license terms or other applicable agreements previously agreed to with Siemens (hereinafter \"License Terms\"). To the extent applicable to information, software or documentation made available in or through a Siemens Security Advisory, the Terms of Use of Siemens\u0027 Global Website (https://www.siemens.com/terms_of_use, hereinafter \"Terms of Use\"), in particular Sections 8-10 of the Terms of Use, shall apply additionally. In case of conflicts, the License Terms shall prevail over the Terms of Use.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "productcert@siemens.com",
"name": "Siemens ProductCERT",
"namespace": "https://www.siemens.com"
},
"references": [
{
"category": "self",
"summary": "SSA-419740: Multiple\tThird-Party Component Vulnerabilities in RUGGEDCOM and SCALANCE Products before V7.2 - PDF Version",
"url": "https://cert-portal.siemens.com/productcert/pdf/ssa-419740.pdf"
},
{
"category": "self",
"summary": "SSA-419740: Multiple\tThird-Party Component Vulnerabilities in RUGGEDCOM and SCALANCE Products before V7.2 - TXT Version",
"url": "https://cert-portal.siemens.com/productcert/txt/ssa-419740.txt"
},
{
"category": "self",
"summary": "SSA-419740: Multiple\tThird-Party Component Vulnerabilities in RUGGEDCOM and SCALANCE Products before V7.2 - CSAF Version",
"url": "https://cert-portal.siemens.com/productcert/csaf/ssa-419740.json"
}
],
"title": "SSA-419740: Multiple\tThird-Party Component Vulnerabilities in RUGGEDCOM and SCALANCE Products before V7.2",
"tracking": {
"current_release_date": "2023-03-14T00:00:00Z",
"generator": {
"engine": {
"name": "Siemens ProductCERT CSAF Generator",
"version": "1"
}
},
"id": "SSA-419740",
"initial_release_date": "2023-03-14T00:00:00Z",
"revision_history": [
{
"date": "2023-03-14T00:00:00Z",
"legacy_version": "1.0",
"number": "1",
"summary": "Publication Date"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c V7.2",
"product": {
"name": "RUGGEDCOM RM1224 LTE(4G) EU (6GK6108-4AM00-2BA2)",
"product_id": "1",
"product_identification_helper": {
"model_numbers": [
"6GK6108-4AM00-2BA2"
]
}
}
}
],
"category": "product_name",
"name": "RUGGEDCOM RM1224 LTE(4G) EU (6GK6108-4AM00-2BA2)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c V7.2",
"product": {
"name": "RUGGEDCOM RM1224 LTE(4G) NAM (6GK6108-4AM00-2DA2)",
"product_id": "2",
"product_identification_helper": {
"model_numbers": [
"6GK6108-4AM00-2DA2"
]
}
}
}
],
"category": "product_name",
"name": "RUGGEDCOM RM1224 LTE(4G) NAM (6GK6108-4AM00-2DA2)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c V7.2",
"product": {
"name": "SCALANCE M804PB (6GK5804-0AP00-2AA2)",
"product_id": "3",
"product_identification_helper": {
"model_numbers": [
"6GK5804-0AP00-2AA2"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE M804PB (6GK5804-0AP00-2AA2)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c V7.2",
"product": {
"name": "SCALANCE M812-1 ADSL-Router (Annex A) (6GK5812-1AA00-2AA2)",
"product_id": "4",
"product_identification_helper": {
"model_numbers": [
"6GK5812-1AA00-2AA2"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE M812-1 ADSL-Router (Annex A) (6GK5812-1AA00-2AA2)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c V7.2",
"product": {
"name": "SCALANCE M812-1 ADSL-Router (Annex B) (6GK5812-1BA00-2AA2)",
"product_id": "5",
"product_identification_helper": {
"model_numbers": [
"6GK5812-1BA00-2AA2"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE M812-1 ADSL-Router (Annex B) (6GK5812-1BA00-2AA2)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c V7.2",
"product": {
"name": "SCALANCE M816-1 ADSL-Router (Annex A) (6GK5816-1AA00-2AA2)",
"product_id": "6",
"product_identification_helper": {
"model_numbers": [
"6GK5816-1AA00-2AA2"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE M816-1 ADSL-Router (Annex A) (6GK5816-1AA00-2AA2)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c V7.2",
"product": {
"name": "SCALANCE M816-1 ADSL-Router (Annex B) (6GK5816-1BA00-2AA2)",
"product_id": "7",
"product_identification_helper": {
"model_numbers": [
"6GK5816-1BA00-2AA2"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE M816-1 ADSL-Router (Annex B) (6GK5816-1BA00-2AA2)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c V7.2",
"product": {
"name": "SCALANCE M826-2 SHDSL-Router (6GK5826-2AB00-2AB2)",
"product_id": "8",
"product_identification_helper": {
"model_numbers": [
"6GK5826-2AB00-2AB2"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE M826-2 SHDSL-Router (6GK5826-2AB00-2AB2)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c V7.2",
"product": {
"name": "SCALANCE M874-2 (6GK5874-2AA00-2AA2)",
"product_id": "9",
"product_identification_helper": {
"model_numbers": [
"6GK5874-2AA00-2AA2"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE M874-2 (6GK5874-2AA00-2AA2)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c V7.2",
"product": {
"name": "SCALANCE M874-3 (6GK5874-3AA00-2AA2)",
"product_id": "10",
"product_identification_helper": {
"model_numbers": [
"6GK5874-3AA00-2AA2"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE M874-3 (6GK5874-3AA00-2AA2)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c V7.2",
"product": {
"name": "SCALANCE M876-3 (EVDO) (6GK5876-3AA02-2BA2)",
"product_id": "11",
"product_identification_helper": {
"model_numbers": [
"6GK5876-3AA02-2BA2"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE M876-3 (EVDO) (6GK5876-3AA02-2BA2)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c V7.2",
"product": {
"name": "SCALANCE M876-3 (ROK) (6GK5876-3AA02-2EA2)",
"product_id": "12",
"product_identification_helper": {
"model_numbers": [
"6GK5876-3AA02-2EA2"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE M876-3 (ROK) (6GK5876-3AA02-2EA2)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c V7.2",
"product": {
"name": "SCALANCE M876-4 (6GK5876-4AA10-2BA2)",
"product_id": "13",
"product_identification_helper": {
"model_numbers": [
"6GK5876-4AA10-2BA2"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE M876-4 (6GK5876-4AA10-2BA2)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c V7.2",
"product": {
"name": "SCALANCE M876-4 (EU) (6GK5876-4AA00-2BA2)",
"product_id": "14",
"product_identification_helper": {
"model_numbers": [
"6GK5876-4AA00-2BA2"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE M876-4 (EU) (6GK5876-4AA00-2BA2)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c V7.2",
"product": {
"name": "SCALANCE M876-4 (NAM) (6GK5876-4AA00-2DA2)",
"product_id": "15",
"product_identification_helper": {
"model_numbers": [
"6GK5876-4AA00-2DA2"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE M876-4 (NAM) (6GK5876-4AA00-2DA2)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c V7.2",
"product": {
"name": "SCALANCE MUM853-1 (EU) (6GK5853-2EA00-2DA1)",
"product_id": "16",
"product_identification_helper": {
"model_numbers": [
"6GK5853-2EA00-2DA1"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE MUM853-1 (EU) (6GK5853-2EA00-2DA1)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c V7.2",
"product": {
"name": "SCALANCE MUM856-1 (EU) (6GK5856-2EA00-3DA1)",
"product_id": "17",
"product_identification_helper": {
"model_numbers": [
"6GK5856-2EA00-3DA1"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE MUM856-1 (EU) (6GK5856-2EA00-3DA1)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c V7.2",
"product": {
"name": "SCALANCE MUM856-1 (RoW) (6GK5856-2EA00-3AA1)",
"product_id": "18",
"product_identification_helper": {
"model_numbers": [
"6GK5856-2EA00-3AA1"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE MUM856-1 (RoW) (6GK5856-2EA00-3AA1)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c V7.2",
"product": {
"name": "SCALANCE S615 (6GK5615-0AA00-2AA2)",
"product_id": "19",
"product_identification_helper": {
"model_numbers": [
"6GK5615-0AA00-2AA2"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE S615 (6GK5615-0AA00-2AA2)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c V7.2",
"product": {
"name": "SCALANCE S615 EEC (6GK5615-0AA01-2AA2)",
"product_id": "20",
"product_identification_helper": {
"model_numbers": [
"6GK5615-0AA01-2AA2"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE S615 EEC (6GK5615-0AA01-2AA2)"
}
],
"category": "vendor",
"name": "Siemens"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2018-25032",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"notes": [
{
"category": "summary",
"text": "zlib before 1.2.12 allows memory corruption when deflating (i.e., when compressing) if the input has many distant matches.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1",
"2",
"3",
"4",
"5",
"6",
"7",
"8",
"9",
"10",
"11",
"12",
"13",
"14",
"15",
"16",
"17",
"18",
"19",
"20"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V7.2 or later version",
"product_ids": [
"1",
"2",
"3",
"4",
"5",
"6",
"7",
"8",
"9",
"10",
"11",
"12",
"13",
"14",
"15",
"16",
"17",
"18",
"19",
"20"
],
"url": "https://support.industry.siemens.com/cs/document/109817007/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"1",
"2",
"3",
"4",
"5",
"6",
"7",
"8",
"9",
"10",
"11",
"12",
"13",
"14",
"15",
"16",
"17",
"18",
"19",
"20"
]
}
],
"title": "CVE-2018-25032"
},
{
"cve": "CVE-2019-1125",
"cwe": {
"id": "CWE-200",
"name": "Exposure of Sensitive Information to an Unauthorized Actor"
},
"notes": [
{
"category": "summary",
"text": "An information disclosure vulnerability exists when certain central processing units (CPU) speculatively access memory, aka \u0027Windows Kernel Information Disclosure Vulnerability\u0027. This CVE ID is unique from CVE-2019-1071, CVE-2019-1073.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1",
"2",
"3",
"4",
"5",
"6",
"7",
"8",
"9",
"10",
"11",
"12",
"13",
"14",
"15",
"16",
"17",
"18",
"19",
"20"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V7.2 or later version",
"product_ids": [
"1",
"2",
"3",
"4",
"5",
"6",
"7",
"8",
"9",
"10",
"11",
"12",
"13",
"14",
"15",
"16",
"17",
"18",
"19",
"20"
],
"url": "https://support.industry.siemens.com/cs/document/109817007/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"1",
"2",
"3",
"4",
"5",
"6",
"7",
"8",
"9",
"10",
"11",
"12",
"13",
"14",
"15",
"16",
"17",
"18",
"19",
"20"
]
}
],
"title": "CVE-2019-1125"
},
{
"cve": "CVE-2021-4034",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"notes": [
{
"category": "summary",
"text": "A local privilege escalation vulnerability was found on polkit\u0027s pkexec utility. The pkexec application is a setuid tool designed to allow unprivileged users to run commands as privileged users according predefined policies. The current version of pkexec doesn\u0027t handle the calling parameters count correctly and ends trying to execute environment variables as commands. An attacker can leverage this by crafting environment variables in such a way it\u0027ll induce pkexec to execute arbitrary code. When successfully executed the attack can cause a local privilege escalation given unprivileged users administrative rights on the target machine.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1",
"2",
"3",
"4",
"5",
"6",
"7",
"8",
"9",
"10",
"11",
"12",
"13",
"14",
"15",
"16",
"17",
"18",
"19",
"20"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V7.2 or later version",
"product_ids": [
"1",
"2",
"3",
"4",
"5",
"6",
"7",
"8",
"9",
"10",
"11",
"12",
"13",
"14",
"15",
"16",
"17",
"18",
"19",
"20"
],
"url": "https://support.industry.siemens.com/cs/document/109817007/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:U/RC:C",
"version": "3.1"
},
"products": [
"1",
"2",
"3",
"4",
"5",
"6",
"7",
"8",
"9",
"10",
"11",
"12",
"13",
"14",
"15",
"16",
"17",
"18",
"19",
"20"
]
}
],
"title": "CVE-2021-4034"
},
{
"cve": "CVE-2021-4149",
"cwe": {
"id": "CWE-667",
"name": "Improper Locking"
},
"notes": [
{
"category": "summary",
"text": "A vulnerability was found in btrfs_alloc_tree_b in fs/btrfs/extent-tree.c in the Linux kernel due to an improper lock operation in btrfs. In this flaw, a user with a local privilege may cause a denial of service (DOS) due to a deadlock problem.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1",
"2",
"3",
"4",
"5",
"6",
"7",
"8",
"9",
"10",
"11",
"12",
"13",
"14",
"15",
"16",
"17",
"18",
"19",
"20"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V7.2 or later version",
"product_ids": [
"1",
"2",
"3",
"4",
"5",
"6",
"7",
"8",
"9",
"10",
"11",
"12",
"13",
"14",
"15",
"16",
"17",
"18",
"19",
"20"
],
"url": "https://support.industry.siemens.com/cs/document/109817007/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"1",
"2",
"3",
"4",
"5",
"6",
"7",
"8",
"9",
"10",
"11",
"12",
"13",
"14",
"15",
"16",
"17",
"18",
"19",
"20"
]
}
],
"title": "CVE-2021-4149"
},
{
"cve": "CVE-2021-26401",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "summary",
"text": "LFENCE/JMP (mitigation V2-2) may not sufficiently mitigate CVE-2017-5715 on some AMD CPUs.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1",
"2",
"3",
"4",
"5",
"6",
"7",
"8",
"9",
"10",
"11",
"12",
"13",
"14",
"15",
"16",
"17",
"18",
"19",
"20"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V7.2 or later version",
"product_ids": [
"1",
"2",
"3",
"4",
"5",
"6",
"7",
"8",
"9",
"10",
"11",
"12",
"13",
"14",
"15",
"16",
"17",
"18",
"19",
"20"
],
"url": "https://support.industry.siemens.com/cs/document/109817007/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.6,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"1",
"2",
"3",
"4",
"5",
"6",
"7",
"8",
"9",
"10",
"11",
"12",
"13",
"14",
"15",
"16",
"17",
"18",
"19",
"20"
]
}
],
"title": "CVE-2021-26401"
},
{
"cve": "CVE-2021-42373",
"cwe": {
"id": "CWE-476",
"name": "NULL Pointer Dereference"
},
"notes": [
{
"category": "summary",
"text": "A NULL pointer dereference in Busybox\u0027s man applet leads to denial of service when a section name is supplied but no page argument is given.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1",
"2",
"3",
"4",
"5",
"6",
"7",
"8",
"9",
"10",
"11",
"12",
"13",
"14",
"15",
"16",
"17",
"18",
"19",
"20"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V7.2 or later version",
"product_ids": [
"1",
"2",
"3",
"4",
"5",
"6",
"7",
"8",
"9",
"10",
"11",
"12",
"13",
"14",
"15",
"16",
"17",
"18",
"19",
"20"
],
"url": "https://support.industry.siemens.com/cs/document/109817007/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.1,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"1",
"2",
"3",
"4",
"5",
"6",
"7",
"8",
"9",
"10",
"11",
"12",
"13",
"14",
"15",
"16",
"17",
"18",
"19",
"20"
]
}
],
"title": "CVE-2021-42373"
},
{
"cve": "CVE-2021-42374",
"cwe": {
"id": "CWE-125",
"name": "Out-of-bounds Read"
},
"notes": [
{
"category": "summary",
"text": "An out-of-bounds heap read in Busybox\u0027s unlzma applet leads to information leak and denial of service when crafted LZMA-compressed input is decompressed. This can be triggered by any applet/format that internally supports LZMA compression.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1",
"2",
"3",
"4",
"5",
"6",
"7",
"8",
"9",
"10",
"11",
"12",
"13",
"14",
"15",
"16",
"17",
"18",
"19",
"20"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V7.2 or later version",
"product_ids": [
"1",
"2",
"3",
"4",
"5",
"6",
"7",
"8",
"9",
"10",
"11",
"12",
"13",
"14",
"15",
"16",
"17",
"18",
"19",
"20"
],
"url": "https://support.industry.siemens.com/cs/document/109817007/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"1",
"2",
"3",
"4",
"5",
"6",
"7",
"8",
"9",
"10",
"11",
"12",
"13",
"14",
"15",
"16",
"17",
"18",
"19",
"20"
]
}
],
"title": "CVE-2021-42374"
},
{
"cve": "CVE-2021-42375",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "summary",
"text": "An incorrect handling of a special element in Busybox\u0027s ash applet leads to denial of service when processing a crafted shell command, due to the shell mistaking specific characters for reserved characters. This may be used for DoS under rare conditions of filtered command input.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1",
"2",
"3",
"4",
"5",
"6",
"7",
"8",
"9",
"10",
"11",
"12",
"13",
"14",
"15",
"16",
"17",
"18",
"19",
"20"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V7.2 or later version",
"product_ids": [
"1",
"2",
"3",
"4",
"5",
"6",
"7",
"8",
"9",
"10",
"11",
"12",
"13",
"14",
"15",
"16",
"17",
"18",
"19",
"20"
],
"url": "https://support.industry.siemens.com/cs/document/109817007/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.1,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"1",
"2",
"3",
"4",
"5",
"6",
"7",
"8",
"9",
"10",
"11",
"12",
"13",
"14",
"15",
"16",
"17",
"18",
"19",
"20"
]
}
],
"title": "CVE-2021-42375"
},
{
"cve": "CVE-2021-42376",
"cwe": {
"id": "CWE-476",
"name": "NULL Pointer Dereference"
},
"notes": [
{
"category": "summary",
"text": "A NULL pointer dereference in Busybox\u0027s hush applet leads to denial of service when processing a crafted shell command, due to missing validation after a \\x03 delimiter character. This may be used for DoS under very rare conditions of filtered command input.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1",
"2",
"3",
"4",
"5",
"6",
"7",
"8",
"9",
"10",
"11",
"12",
"13",
"14",
"15",
"16",
"17",
"18",
"19",
"20"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V7.2 or later version",
"product_ids": [
"1",
"2",
"3",
"4",
"5",
"6",
"7",
"8",
"9",
"10",
"11",
"12",
"13",
"14",
"15",
"16",
"17",
"18",
"19",
"20"
],
"url": "https://support.industry.siemens.com/cs/document/109817007/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.1,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"1",
"2",
"3",
"4",
"5",
"6",
"7",
"8",
"9",
"10",
"11",
"12",
"13",
"14",
"15",
"16",
"17",
"18",
"19",
"20"
]
}
],
"title": "CVE-2021-42376"
},
{
"cve": "CVE-2021-42377",
"cwe": {
"id": "CWE-763",
"name": "Release of Invalid Pointer or Reference"
},
"notes": [
{
"category": "summary",
"text": "An attacker-controlled pointer free in Busybox\u0027s hush applet leads to denial of service and possible code execution when processing a crafted shell command, due to the shell mishandling the \u0026\u0026\u0026 string. This may be used for remote code execution under rare conditions of filtered command input.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1",
"2",
"3",
"4",
"5",
"6",
"7",
"8",
"9",
"10",
"11",
"12",
"13",
"14",
"15",
"16",
"17",
"18",
"19",
"20"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V7.2 or later version",
"product_ids": [
"1",
"2",
"3",
"4",
"5",
"6",
"7",
"8",
"9",
"10",
"11",
"12",
"13",
"14",
"15",
"16",
"17",
"18",
"19",
"20"
],
"url": "https://support.industry.siemens.com/cs/document/109817007/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"1",
"2",
"3",
"4",
"5",
"6",
"7",
"8",
"9",
"10",
"11",
"12",
"13",
"14",
"15",
"16",
"17",
"18",
"19",
"20"
]
}
],
"title": "CVE-2021-42377"
},
{
"cve": "CVE-2021-42378",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"notes": [
{
"category": "summary",
"text": "A use-after-free in Busybox\u0027s awk applet leads to denial of service and possibly code execution when processing a crafted awk pattern in the getvar_i function.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1",
"2",
"3",
"4",
"5",
"6",
"7",
"8",
"9",
"10",
"11",
"12",
"13",
"14",
"15",
"16",
"17",
"18",
"19",
"20"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V7.2 or later version",
"product_ids": [
"1",
"2",
"3",
"4",
"5",
"6",
"7",
"8",
"9",
"10",
"11",
"12",
"13",
"14",
"15",
"16",
"17",
"18",
"19",
"20"
],
"url": "https://support.industry.siemens.com/cs/document/109817007/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.6,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"1",
"2",
"3",
"4",
"5",
"6",
"7",
"8",
"9",
"10",
"11",
"12",
"13",
"14",
"15",
"16",
"17",
"18",
"19",
"20"
]
}
],
"title": "CVE-2021-42378"
},
{
"cve": "CVE-2021-42379",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"notes": [
{
"category": "summary",
"text": "A use-after-free in Busybox\u0027s awk applet leads to denial of service and possibly code execution when processing a crafted awk pattern in the next_input_file function.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1",
"2",
"3",
"4",
"5",
"6",
"7",
"8",
"9",
"10",
"11",
"12",
"13",
"14",
"15",
"16",
"17",
"18",
"19",
"20"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V7.2 or later version",
"product_ids": [
"1",
"2",
"3",
"4",
"5",
"6",
"7",
"8",
"9",
"10",
"11",
"12",
"13",
"14",
"15",
"16",
"17",
"18",
"19",
"20"
],
"url": "https://support.industry.siemens.com/cs/document/109817007/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.6,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"1",
"2",
"3",
"4",
"5",
"6",
"7",
"8",
"9",
"10",
"11",
"12",
"13",
"14",
"15",
"16",
"17",
"18",
"19",
"20"
]
}
],
"title": "CVE-2021-42379"
},
{
"cve": "CVE-2021-42380",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"notes": [
{
"category": "summary",
"text": "A use-after-free in awk leads to denial of service and possibly code execution when processing a crafted awk pattern in the clrvar function.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1",
"2",
"3",
"4",
"5",
"6",
"7",
"8",
"9",
"10",
"11",
"12",
"13",
"14",
"15",
"16",
"17",
"18",
"19",
"20"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V7.2 or later version",
"product_ids": [
"1",
"2",
"3",
"4",
"5",
"6",
"7",
"8",
"9",
"10",
"11",
"12",
"13",
"14",
"15",
"16",
"17",
"18",
"19",
"20"
],
"url": "https://support.industry.siemens.com/cs/document/109817007/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.6,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"1",
"2",
"3",
"4",
"5",
"6",
"7",
"8",
"9",
"10",
"11",
"12",
"13",
"14",
"15",
"16",
"17",
"18",
"19",
"20"
]
}
],
"title": "CVE-2021-42380"
},
{
"cve": "CVE-2021-42381",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"notes": [
{
"category": "summary",
"text": "A use-after-free in awk leads to denial of service and possibly code execution when processing a crafted awk pattern in the hash_init function.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1",
"2",
"3",
"4",
"5",
"6",
"7",
"8",
"9",
"10",
"11",
"12",
"13",
"14",
"15",
"16",
"17",
"18",
"19",
"20"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V7.2 or later version",
"product_ids": [
"1",
"2",
"3",
"4",
"5",
"6",
"7",
"8",
"9",
"10",
"11",
"12",
"13",
"14",
"15",
"16",
"17",
"18",
"19",
"20"
],
"url": "https://support.industry.siemens.com/cs/document/109817007/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.6,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"1",
"2",
"3",
"4",
"5",
"6",
"7",
"8",
"9",
"10",
"11",
"12",
"13",
"14",
"15",
"16",
"17",
"18",
"19",
"20"
]
}
],
"title": "CVE-2021-42381"
},
{
"cve": "CVE-2021-42382",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"notes": [
{
"category": "summary",
"text": "A use-after-free in awk leads to denial of service and possibly code execution when processing a crafted awk pattern in the getvar_s function.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1",
"2",
"3",
"4",
"5",
"6",
"7",
"8",
"9",
"10",
"11",
"12",
"13",
"14",
"15",
"16",
"17",
"18",
"19",
"20"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V7.2 or later version",
"product_ids": [
"1",
"2",
"3",
"4",
"5",
"6",
"7",
"8",
"9",
"10",
"11",
"12",
"13",
"14",
"15",
"16",
"17",
"18",
"19",
"20"
],
"url": "https://support.industry.siemens.com/cs/document/109817007/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.6,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"1",
"2",
"3",
"4",
"5",
"6",
"7",
"8",
"9",
"10",
"11",
"12",
"13",
"14",
"15",
"16",
"17",
"18",
"19",
"20"
]
}
],
"title": "CVE-2021-42382"
},
{
"cve": "CVE-2021-42383",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"notes": [
{
"category": "summary",
"text": "A use-after-free in awk leads to denial of service and possibly code execution when processing a crafted awk pattern in the evaluate function.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1",
"2",
"3",
"4",
"5",
"6",
"7",
"8",
"9",
"10",
"11",
"12",
"13",
"14",
"15",
"16",
"17",
"18",
"19",
"20"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V7.2 or later version",
"product_ids": [
"1",
"2",
"3",
"4",
"5",
"6",
"7",
"8",
"9",
"10",
"11",
"12",
"13",
"14",
"15",
"16",
"17",
"18",
"19",
"20"
],
"url": "https://support.industry.siemens.com/cs/document/109817007/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.6,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"1",
"2",
"3",
"4",
"5",
"6",
"7",
"8",
"9",
"10",
"11",
"12",
"13",
"14",
"15",
"16",
"17",
"18",
"19",
"20"
]
}
],
"title": "CVE-2021-42383"
},
{
"cve": "CVE-2021-42384",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"notes": [
{
"category": "summary",
"text": "A use-after-free in Busybox\u0027s awk applet leads to denial of service and possibly code execution when processing a crafted awk pattern in the handle_special function.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1",
"2",
"3",
"4",
"5",
"6",
"7",
"8",
"9",
"10",
"11",
"12",
"13",
"14",
"15",
"16",
"17",
"18",
"19",
"20"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V7.2 or later version",
"product_ids": [
"1",
"2",
"3",
"4",
"5",
"6",
"7",
"8",
"9",
"10",
"11",
"12",
"13",
"14",
"15",
"16",
"17",
"18",
"19",
"20"
],
"url": "https://support.industry.siemens.com/cs/document/109817007/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.6,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"1",
"2",
"3",
"4",
"5",
"6",
"7",
"8",
"9",
"10",
"11",
"12",
"13",
"14",
"15",
"16",
"17",
"18",
"19",
"20"
]
}
],
"title": "CVE-2021-42384"
},
{
"cve": "CVE-2021-42385",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"notes": [
{
"category": "summary",
"text": "A use-after-free in awk leads to denial of service and possibly code execution when processing a crafted awk pattern in the evaluate function.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1",
"2",
"3",
"4",
"5",
"6",
"7",
"8",
"9",
"10",
"11",
"12",
"13",
"14",
"15",
"16",
"17",
"18",
"19",
"20"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V7.2 or later version",
"product_ids": [
"1",
"2",
"3",
"4",
"5",
"6",
"7",
"8",
"9",
"10",
"11",
"12",
"13",
"14",
"15",
"16",
"17",
"18",
"19",
"20"
],
"url": "https://support.industry.siemens.com/cs/document/109817007/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.6,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"1",
"2",
"3",
"4",
"5",
"6",
"7",
"8",
"9",
"10",
"11",
"12",
"13",
"14",
"15",
"16",
"17",
"18",
"19",
"20"
]
}
],
"title": "CVE-2021-42385"
},
{
"cve": "CVE-2021-42386",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"notes": [
{
"category": "summary",
"text": "A use-after-free in awk leads to denial of service and possibly code execution when processing a crafted awk pattern in the nvalloc function.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1",
"2",
"3",
"4",
"5",
"6",
"7",
"8",
"9",
"10",
"11",
"12",
"13",
"14",
"15",
"16",
"17",
"18",
"19",
"20"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V7.2 or later version",
"product_ids": [
"1",
"2",
"3",
"4",
"5",
"6",
"7",
"8",
"9",
"10",
"11",
"12",
"13",
"14",
"15",
"16",
"17",
"18",
"19",
"20"
],
"url": "https://support.industry.siemens.com/cs/document/109817007/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.6,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"1",
"2",
"3",
"4",
"5",
"6",
"7",
"8",
"9",
"10",
"11",
"12",
"13",
"14",
"15",
"16",
"17",
"18",
"19",
"20"
]
}
],
"title": "CVE-2021-42386"
},
{
"cve": "CVE-2022-0001",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "summary",
"text": "Non-transparent sharing of branch predictor selectors between contexts in some Intel(R) Processors may allow an authorized user to potentially enable information disclosure via local access.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1",
"2",
"3",
"4",
"5",
"6",
"7",
"8",
"9",
"10",
"11",
"12",
"13",
"14",
"15",
"16",
"17",
"18",
"19",
"20"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V7.2 or later version",
"product_ids": [
"1",
"2",
"3",
"4",
"5",
"6",
"7",
"8",
"9",
"10",
"11",
"12",
"13",
"14",
"15",
"16",
"17",
"18",
"19",
"20"
],
"url": "https://support.industry.siemens.com/cs/document/109817007/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"1",
"2",
"3",
"4",
"5",
"6",
"7",
"8",
"9",
"10",
"11",
"12",
"13",
"14",
"15",
"16",
"17",
"18",
"19",
"20"
]
}
],
"title": "CVE-2022-0001"
},
{
"cve": "CVE-2022-0002",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "summary",
"text": "Non-transparent sharing of branch predictor within a context in some Intel(R) Processors may allow an authorized user to potentially enable information disclosure via local access.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1",
"2",
"3",
"4",
"5",
"6",
"7",
"8",
"9",
"10",
"11",
"12",
"13",
"14",
"15",
"16",
"17",
"18",
"19",
"20"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V7.2 or later version",
"product_ids": [
"1",
"2",
"3",
"4",
"5",
"6",
"7",
"8",
"9",
"10",
"11",
"12",
"13",
"14",
"15",
"16",
"17",
"18",
"19",
"20"
],
"url": "https://support.industry.siemens.com/cs/document/109817007/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"1",
"2",
"3",
"4",
"5",
"6",
"7",
"8",
"9",
"10",
"11",
"12",
"13",
"14",
"15",
"16",
"17",
"18",
"19",
"20"
]
}
],
"title": "CVE-2022-0002"
},
{
"cve": "CVE-2022-0494",
"cwe": {
"id": "CWE-200",
"name": "Exposure of Sensitive Information to an Unauthorized Actor"
},
"notes": [
{
"category": "summary",
"text": "A kernel information leak flaw was identified in the scsi_ioctl function in drivers/scsi/scsi_ioctl.c in the Linux kernel. This flaw allows a local attacker with a special user privilege (CAP_SYS_ADMIN or CAP_SYS_RAWIO) to create issues with confidentiality.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1",
"2",
"3",
"4",
"5",
"6",
"7",
"8",
"9",
"10",
"11",
"12",
"13",
"14",
"15",
"16",
"17",
"18",
"19",
"20"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V7.2 or later version",
"product_ids": [
"1",
"2",
"3",
"4",
"5",
"6",
"7",
"8",
"9",
"10",
"11",
"12",
"13",
"14",
"15",
"16",
"17",
"18",
"19",
"20"
],
"url": "https://support.industry.siemens.com/cs/document/109817007/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"1",
"2",
"3",
"4",
"5",
"6",
"7",
"8",
"9",
"10",
"11",
"12",
"13",
"14",
"15",
"16",
"17",
"18",
"19",
"20"
]
}
],
"title": "CVE-2022-0494"
},
{
"cve": "CVE-2022-0547",
"cwe": {
"id": "CWE-287",
"name": "Improper Authentication"
},
"notes": [
{
"category": "summary",
"text": "OpenVPN 2.1 until v2.4.12 and v2.5.6 may enable authentication bypass in external authentication plug-ins when more than one of them makes use of deferred authentication replies, which allows an external user to be granted access with only partially correct credentials.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1",
"2",
"3",
"4",
"5",
"6",
"7",
"8",
"9",
"10",
"11",
"12",
"13",
"14",
"15",
"16",
"17",
"18",
"19",
"20"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V7.2 or later version",
"product_ids": [
"1",
"2",
"3",
"4",
"5",
"6",
"7",
"8",
"9",
"10",
"11",
"12",
"13",
"14",
"15",
"16",
"17",
"18",
"19",
"20"
],
"url": "https://support.industry.siemens.com/cs/document/109817007/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"1",
"2",
"3",
"4",
"5",
"6",
"7",
"8",
"9",
"10",
"11",
"12",
"13",
"14",
"15",
"16",
"17",
"18",
"19",
"20"
]
}
],
"title": "CVE-2022-0547"
},
{
"cve": "CVE-2022-1011",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"notes": [
{
"category": "summary",
"text": "A use-after-free flaw was found in the Linux kernel\u2019s FUSE filesystem in the way a user triggers write(). This flaw allows a local user to gain unauthorized access to data from the FUSE filesystem, resulting in privilege escalation.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1",
"2",
"3",
"4",
"5",
"6",
"7",
"8",
"9",
"10",
"11",
"12",
"13",
"14",
"15",
"16",
"17",
"18",
"19",
"20"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V7.2 or later version",
"product_ids": [
"1",
"2",
"3",
"4",
"5",
"6",
"7",
"8",
"9",
"10",
"11",
"12",
"13",
"14",
"15",
"16",
"17",
"18",
"19",
"20"
],
"url": "https://support.industry.siemens.com/cs/document/109817007/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"1",
"2",
"3",
"4",
"5",
"6",
"7",
"8",
"9",
"10",
"11",
"12",
"13",
"14",
"15",
"16",
"17",
"18",
"19",
"20"
]
}
],
"title": "CVE-2022-1011"
},
{
"cve": "CVE-2022-1016",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"notes": [
{
"category": "summary",
"text": "A flaw was found in the Linux kernel in net/netfilter/nf_tables_core.c:nft_do_chain, which can cause a use-after-free. This issue needs to handle \u0027return\u0027 with proper preconditions, as it can lead to a kernel information leak problem caused by a local, unprivileged attacker.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1",
"2",
"3",
"4",
"5",
"6",
"7",
"8",
"9",
"10",
"11",
"12",
"13",
"14",
"15",
"16",
"17",
"18",
"19",
"20"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V7.2 or later version",
"product_ids": [
"1",
"2",
"3",
"4",
"5",
"6",
"7",
"8",
"9",
"10",
"11",
"12",
"13",
"14",
"15",
"16",
"17",
"18",
"19",
"20"
],
"url": "https://support.industry.siemens.com/cs/document/109817007/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"1",
"2",
"3",
"4",
"5",
"6",
"7",
"8",
"9",
"10",
"11",
"12",
"13",
"14",
"15",
"16",
"17",
"18",
"19",
"20"
]
}
],
"title": "CVE-2022-1016"
},
{
"cve": "CVE-2022-1198",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"notes": [
{
"category": "summary",
"text": "A use-after-free vulnerabilitity was discovered in drivers/net/hamradio/6pack.c of linux that allows an attacker to crash linux kernel by simulating ax25 device using 6pack driver from user space.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1",
"2",
"3",
"4",
"5",
"6",
"7",
"8",
"9",
"10",
"11",
"12",
"13",
"14",
"15",
"16",
"17",
"18",
"19",
"20"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V7.2 or later version",
"product_ids": [
"1",
"2",
"3",
"4",
"5",
"6",
"7",
"8",
"9",
"10",
"11",
"12",
"13",
"14",
"15",
"16",
"17",
"18",
"19",
"20"
],
"url": "https://support.industry.siemens.com/cs/document/109817007/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"1",
"2",
"3",
"4",
"5",
"6",
"7",
"8",
"9",
"10",
"11",
"12",
"13",
"14",
"15",
"16",
"17",
"18",
"19",
"20"
]
}
],
"title": "CVE-2022-1198"
},
{
"cve": "CVE-2022-1199",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"notes": [
{
"category": "summary",
"text": "A flaw was found in the Linux kernel. This flaw allows an attacker to crash the Linux kernel by simulating amateur radio from the user space, resulting in a null-ptr-deref vulnerability and a use-after-free vulnerability.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1",
"2",
"3",
"4",
"5",
"6",
"7",
"8",
"9",
"10",
"11",
"12",
"13",
"14",
"15",
"16",
"17",
"18",
"19",
"20"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V7.2 or later version",
"product_ids": [
"1",
"2",
"3",
"4",
"5",
"6",
"7",
"8",
"9",
"10",
"11",
"12",
"13",
"14",
"15",
"16",
"17",
"18",
"19",
"20"
],
"url": "https://support.industry.siemens.com/cs/document/109817007/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"1",
"2",
"3",
"4",
"5",
"6",
"7",
"8",
"9",
"10",
"11",
"12",
"13",
"14",
"15",
"16",
"17",
"18",
"19",
"20"
]
}
],
"title": "CVE-2022-1199"
},
{
"cve": "CVE-2022-1292",
"cwe": {
"id": "CWE-78",
"name": "Improper Neutralization of Special Elements used in an OS Command (\u0027OS Command Injection\u0027)"
},
"notes": [
{
"category": "summary",
"text": "The c_rehash script does not properly sanitise shell metacharacters to prevent command injection.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1",
"2",
"3",
"4",
"5",
"6",
"7",
"8",
"9",
"10",
"11",
"12",
"13",
"14",
"15",
"16",
"17",
"18",
"19",
"20"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V7.2 or later version",
"product_ids": [
"1",
"2",
"3",
"4",
"5",
"6",
"7",
"8",
"9",
"10",
"11",
"12",
"13",
"14",
"15",
"16",
"17",
"18",
"19",
"20"
],
"url": "https://support.industry.siemens.com/cs/document/109817007/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"1",
"2",
"3",
"4",
"5",
"6",
"7",
"8",
"9",
"10",
"11",
"12",
"13",
"14",
"15",
"16",
"17",
"18",
"19",
"20"
]
}
],
"title": "CVE-2022-1292"
},
{
"cve": "CVE-2022-1304",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"notes": [
{
"category": "summary",
"text": "An out-of-bounds read/write vulnerability was found in e2fsprogs 1.46.5. This issue leads to a segmentation fault and possibly arbitrary code execution via a specially crafted filesystem.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1",
"2",
"3",
"4",
"5",
"6",
"7",
"8",
"9",
"10",
"11",
"12",
"13",
"14",
"15",
"16",
"17",
"18",
"19",
"20"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V7.2 or later version",
"product_ids": [
"1",
"2",
"3",
"4",
"5",
"6",
"7",
"8",
"9",
"10",
"11",
"12",
"13",
"14",
"15",
"16",
"17",
"18",
"19",
"20"
],
"url": "https://support.industry.siemens.com/cs/document/109817007/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"1",
"2",
"3",
"4",
"5",
"6",
"7",
"8",
"9",
"10",
"11",
"12",
"13",
"14",
"15",
"16",
"17",
"18",
"19",
"20"
]
}
],
"title": "CVE-2022-1304"
},
{
"cve": "CVE-2022-1343",
"cwe": {
"id": "CWE-295",
"name": "Improper Certificate Validation"
},
"notes": [
{
"category": "summary",
"text": "Under certain circumstances, the command line OCSP verify function reports successful verification when the varification in fact failed. In this case the incorrect successful response will also be accompanied by error messages showing the failure and contradicting the apparently successful result.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1",
"2",
"3",
"4",
"5",
"6",
"7",
"8",
"9",
"10",
"11",
"12",
"13",
"14",
"15",
"16",
"17",
"18",
"19",
"20"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V7.2 or later version",
"product_ids": [
"1",
"2",
"3",
"4",
"5",
"6",
"7",
"8",
"9",
"10",
"11",
"12",
"13",
"14",
"15",
"16",
"17",
"18",
"19",
"20"
],
"url": "https://support.industry.siemens.com/cs/document/109817007/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"1",
"2",
"3",
"4",
"5",
"6",
"7",
"8",
"9",
"10",
"11",
"12",
"13",
"14",
"15",
"16",
"17",
"18",
"19",
"20"
]
}
],
"title": "CVE-2022-1343"
},
{
"cve": "CVE-2022-1353",
"cwe": {
"id": "CWE-200",
"name": "Exposure of Sensitive Information to an Unauthorized Actor"
},
"notes": [
{
"category": "summary",
"text": "A vulnerability was found in the pfkey_register function in net/key/af_key.c in the Linux kernel. This flaw allows a local, unprivileged user to gain access to kernel memory, leading to a system crash or a leak of internal kernel information.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1",
"2",
"3",
"4",
"5",
"6",
"7",
"8",
"9",
"10",
"11",
"12",
"13",
"14",
"15",
"16",
"17",
"18",
"19",
"20"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V7.2 or later version",
"product_ids": [
"1",
"2",
"3",
"4",
"5",
"6",
"7",
"8",
"9",
"10",
"11",
"12",
"13",
"14",
"15",
"16",
"17",
"18",
"19",
"20"
],
"url": "https://support.industry.siemens.com/cs/document/109817007/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.1,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"1",
"2",
"3",
"4",
"5",
"6",
"7",
"8",
"9",
"10",
"11",
"12",
"13",
"14",
"15",
"16",
"17",
"18",
"19",
"20"
]
}
],
"title": "CVE-2022-1353"
},
{
"cve": "CVE-2022-1473",
"cwe": {
"id": "CWE-404",
"name": "Improper Resource Shutdown or Release"
},
"notes": [
{
"category": "summary",
"text": "The used OpenSSL version improperly reuses memory when decoding certificates or keys. This can lead to a process termination and Denial of Service for long lived processes.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1",
"2",
"3",
"4",
"5",
"6",
"7",
"8",
"9",
"10",
"11",
"12",
"13",
"14",
"15",
"16",
"17",
"18",
"19",
"20"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V7.2 or later version",
"product_ids": [
"1",
"2",
"3",
"4",
"5",
"6",
"7",
"8",
"9",
"10",
"11",
"12",
"13",
"14",
"15",
"16",
"17",
"18",
"19",
"20"
],
"url": "https://support.industry.siemens.com/cs/document/109817007/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"1",
"2",
"3",
"4",
"5",
"6",
"7",
"8",
"9",
"10",
"11",
"12",
"13",
"14",
"15",
"16",
"17",
"18",
"19",
"20"
]
}
],
"title": "CVE-2022-1473"
},
{
"cve": "CVE-2022-1516",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"notes": [
{
"category": "summary",
"text": "A NULL pointer dereference flaw was found in the Linux kernel\u2019s X.25 set of standardized network protocols functionality in the way a user terminates their session using a simulated Ethernet card and continued usage of this connection. This flaw allows a local user to crash the system.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1",
"2",
"3",
"4",
"5",
"6",
"7",
"8",
"9",
"10",
"11",
"12",
"13",
"14",
"15",
"16",
"17",
"18",
"19",
"20"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V7.2 or later version",
"product_ids": [
"1",
"2",
"3",
"4",
"5",
"6",
"7",
"8",
"9",
"10",
"11",
"12",
"13",
"14",
"15",
"16",
"17",
"18",
"19",
"20"
],
"url": "https://support.industry.siemens.com/cs/document/109817007/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"1",
"2",
"3",
"4",
"5",
"6",
"7",
"8",
"9",
"10",
"11",
"12",
"13",
"14",
"15",
"16",
"17",
"18",
"19",
"20"
]
}
],
"title": "CVE-2022-1516"
},
{
"cve": "CVE-2022-1652",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"notes": [
{
"category": "summary",
"text": "Linux Kernel could allow a local attacker to execute arbitrary code on the system, caused by a concurrency use-after-free flaw in the bad_flp_intr function. By executing a specially-crafted program, an attacker could exploit this vulnerability to execute arbitrary code or cause a denial of service condition on the system.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1",
"2",
"3",
"4",
"5",
"6",
"7",
"8",
"9",
"10",
"11",
"12",
"13",
"14",
"15",
"16",
"17",
"18",
"19",
"20"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V7.2 or later version",
"product_ids": [
"1",
"2",
"3",
"4",
"5",
"6",
"7",
"8",
"9",
"10",
"11",
"12",
"13",
"14",
"15",
"16",
"17",
"18",
"19",
"20"
],
"url": "https://support.industry.siemens.com/cs/document/109817007/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"1",
"2",
"3",
"4",
"5",
"6",
"7",
"8",
"9",
"10",
"11",
"12",
"13",
"14",
"15",
"16",
"17",
"18",
"19",
"20"
]
}
],
"title": "CVE-2022-1652"
},
{
"cve": "CVE-2022-1729",
"cwe": {
"id": "CWE-362",
"name": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)"
},
"notes": [
{
"category": "summary",
"text": "A race condition was found the Linux kernel in perf_event_open() which can be exploited by an unprivileged user to gain root privileges. The bug allows to build several exploit primitives such as kernel address information leak, arbitrary execution, etc.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1",
"2",
"3",
"4",
"5",
"6",
"7",
"8",
"9",
"10",
"11",
"12",
"13",
"14",
"15",
"16",
"17",
"18",
"19",
"20"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V7.2 or later version",
"product_ids": [
"1",
"2",
"3",
"4",
"5",
"6",
"7",
"8",
"9",
"10",
"11",
"12",
"13",
"14",
"15",
"16",
"17",
"18",
"19",
"20"
],
"url": "https://support.industry.siemens.com/cs/document/109817007/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.0,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"1",
"2",
"3",
"4",
"5",
"6",
"7",
"8",
"9",
"10",
"11",
"12",
"13",
"14",
"15",
"16",
"17",
"18",
"19",
"20"
]
}
],
"title": "CVE-2022-1729"
},
{
"cve": "CVE-2022-1734",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"notes": [
{
"category": "summary",
"text": "A flaw in Linux Kernel found in nfcmrvl_nci_unregister_dev() in drivers/nfc/nfcmrvl/main.c can lead to use after free both read or write when non synchronized between cleanup routine and firmware download routine.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1",
"2",
"3",
"4",
"5",
"6",
"7",
"8",
"9",
"10",
"11",
"12",
"13",
"14",
"15",
"16",
"17",
"18",
"19",
"20"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V7.2 or later version",
"product_ids": [
"1",
"2",
"3",
"4",
"5",
"6",
"7",
"8",
"9",
"10",
"11",
"12",
"13",
"14",
"15",
"16",
"17",
"18",
"19",
"20"
],
"url": "https://support.industry.siemens.com/cs/document/109817007/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.0,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"1",
"2",
"3",
"4",
"5",
"6",
"7",
"8",
"9",
"10",
"11",
"12",
"13",
"14",
"15",
"16",
"17",
"18",
"19",
"20"
]
}
],
"title": "CVE-2022-1734"
},
{
"cve": "CVE-2022-1974",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"notes": [
{
"category": "summary",
"text": "A use-after-free flaw was found in the Linux kernel\u0027s NFC core functionality due to a race condition between kobject creation and delete. This vulnerability allows a local attacker with CAP_NET_ADMIN privilege to leak kernel information.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1",
"2",
"3",
"4",
"5",
"6",
"7",
"8",
"9",
"10",
"11",
"12",
"13",
"14",
"15",
"16",
"17",
"18",
"19",
"20"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V7.2 or later version",
"product_ids": [
"1",
"2",
"3",
"4",
"5",
"6",
"7",
"8",
"9",
"10",
"11",
"12",
"13",
"14",
"15",
"16",
"17",
"18",
"19",
"20"
],
"url": "https://support.industry.siemens.com/cs/document/109817007/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.1,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:N/A:N/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"1",
"2",
"3",
"4",
"5",
"6",
"7",
"8",
"9",
"10",
"11",
"12",
"13",
"14",
"15",
"16",
"17",
"18",
"19",
"20"
]
}
],
"title": "CVE-2022-1974"
},
{
"cve": "CVE-2022-1975",
"cwe": {
"id": "CWE-248",
"name": "Uncaught Exception"
},
"notes": [
{
"category": "summary",
"text": "There is a sleep-in-atomic bug in /net/nfc/netlink.c that allows an attacker to crash the Linux kernel by simulating a nfc device from user-space.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1",
"2",
"3",
"4",
"5",
"6",
"7",
"8",
"9",
"10",
"11",
"12",
"13",
"14",
"15",
"16",
"17",
"18",
"19",
"20"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V7.2 or later version",
"product_ids": [
"1",
"2",
"3",
"4",
"5",
"6",
"7",
"8",
"9",
"10",
"11",
"12",
"13",
"14",
"15",
"16",
"17",
"18",
"19",
"20"
],
"url": "https://support.industry.siemens.com/cs/document/109817007/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"1",
"2",
"3",
"4",
"5",
"6",
"7",
"8",
"9",
"10",
"11",
"12",
"13",
"14",
"15",
"16",
"17",
"18",
"19",
"20"
]
}
],
"title": "CVE-2022-1975"
},
{
"cve": "CVE-2022-2380",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"notes": [
{
"category": "summary",
"text": "The Linux kernel was found vulnerable out of bounds memory access in the drivers/video/fbdev/sm712fb.c:smtcfb_read() function. The vulnerability could result in local attackers being able to crash the kernel.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1",
"2",
"3",
"4",
"5",
"6",
"7",
"8",
"9",
"10",
"11",
"12",
"13",
"14",
"15",
"16",
"17",
"18",
"19",
"20"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V7.2 or later version",
"product_ids": [
"1",
"2",
"3",
"4",
"5",
"6",
"7",
"8",
"9",
"10",
"11",
"12",
"13",
"14",
"15",
"16",
"17",
"18",
"19",
"20"
],
"url": "https://support.industry.siemens.com/cs/document/109817007/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"1",
"2",
"3",
"4",
"5",
"6",
"7",
"8",
"9",
"10",
"11",
"12",
"13",
"14",
"15",
"16",
"17",
"18",
"19",
"20"
]
}
],
"title": "CVE-2022-2380"
},
{
"cve": "CVE-2022-2588",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "summary",
"text": "Zhenpeng Lin discovered that the network packet scheduler implementation in the Linux kernel did not properly remove all references to a route filter before freeing it in some situations. A local attacker could use this to cause a denial of service (system crash) or execute arbitrary code.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1",
"2",
"3",
"4",
"5",
"6",
"7",
"8",
"9",
"10",
"11",
"12",
"13",
"14",
"15",
"16",
"17",
"18",
"19",
"20"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V7.2 or later version",
"product_ids": [
"1",
"2",
"3",
"4",
"5",
"6",
"7",
"8",
"9",
"10",
"11",
"12",
"13",
"14",
"15",
"16",
"17",
"18",
"19",
"20"
],
"url": "https://support.industry.siemens.com/cs/document/109817007/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"1",
"2",
"3",
"4",
"5",
"6",
"7",
"8",
"9",
"10",
"11",
"12",
"13",
"14",
"15",
"16",
"17",
"18",
"19",
"20"
]
}
],
"title": "CVE-2022-2588"
},
{
"cve": "CVE-2022-2639",
"cwe": {
"id": "CWE-191",
"name": "Integer Underflow (Wrap or Wraparound)"
},
"notes": [
{
"category": "summary",
"text": "An integer coercion error was found in the openvswitch kernel module. Given a sufficiently large number of actions, while copying and reserving memory for a new action of a new flow, the reserve_sfa_size() function does not return -EMSGSIZE as expected, potentially leading to an out-of-bounds write access. This flaw allows a local user to crash or potentially escalate their privileges on the system.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1",
"2",
"3",
"4",
"5",
"6",
"7",
"8",
"9",
"10",
"11",
"12",
"13",
"14",
"15",
"16",
"17",
"18",
"19",
"20"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V7.2 or later version",
"product_ids": [
"1",
"2",
"3",
"4",
"5",
"6",
"7",
"8",
"9",
"10",
"11",
"12",
"13",
"14",
"15",
"16",
"17",
"18",
"19",
"20"
],
"url": "https://support.industry.siemens.com/cs/document/109817007/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"1",
"2",
"3",
"4",
"5",
"6",
"7",
"8",
"9",
"10",
"11",
"12",
"13",
"14",
"15",
"16",
"17",
"18",
"19",
"20"
]
}
],
"title": "CVE-2022-2639"
},
{
"cve": "CVE-2022-20158",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"notes": [
{
"category": "summary",
"text": "In bdi_put and bdi_unregister of backing-dev.c, there is a possible memory corruption due to a use after free. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-182815710References: Upstream kernel",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1",
"2",
"3",
"4",
"5",
"6",
"7",
"8",
"9",
"10",
"11",
"12",
"13",
"14",
"15",
"16",
"17",
"18",
"19",
"20"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V7.2 or later version",
"product_ids": [
"1",
"2",
"3",
"4",
"5",
"6",
"7",
"8",
"9",
"10",
"11",
"12",
"13",
"14",
"15",
"16",
"17",
"18",
"19",
"20"
],
"url": "https://support.industry.siemens.com/cs/document/109817007/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"1",
"2",
"3",
"4",
"5",
"6",
"7",
"8",
"9",
"10",
"11",
"12",
"13",
"14",
"15",
"16",
"17",
"18",
"19",
"20"
]
}
],
"title": "CVE-2022-20158"
},
{
"cve": "CVE-2022-23036",
"cwe": {
"id": "CWE-362",
"name": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)"
},
"notes": [
{
"category": "summary",
"text": "Linux PV device frontends vulnerable to attacks by backends [This CNA information record relates to multiple CVEs; the text explains which aspects/vulnerabilities correspond to which CVE.] Several Linux PV device frontends are using the grant table interfaces for removing access rights of the backends in ways being subject to race conditions, resulting in potential data leaks, data corruption by malicious backends, and denial of service triggered by malicious backends: blkfront, netfront, scsifront and the gntalloc driver are testing whether a grant reference is still in use. If this is not the case, they assume that a following removal of the granted access will always succeed, which is not true in case the backend has mapped the granted page between those two operations. As a result the backend can keep access to the memory page of the guest no matter how the page will be used after the frontend I/O has finished. The xenbus driver has a similar problem, as it doesn\u0027t check the success of removing the granted access of a shared ring buffer. blkfront: CVE-2022-23036 netfront: CVE-2022-23037 scsifront: CVE-2022-23038 gntalloc: CVE-2022-23039 xenbus: CVE-2022-23040 blkfront, netfront, scsifront, usbfront, dmabuf, xenbus, 9p, kbdfront, and pvcalls are using a functionality to delay freeing a grant reference until it is no longer in use, but the freeing of the related data page is not synchronized with dropping the granted access. As a result the backend can keep access to the memory page even after it has been freed and then re-used for a different purpose. CVE-2022-23041 netfront will fail a BUG_ON() assertion if it fails to revoke access in the rx path. This will result in a Denial of Service (DoS) situation of the guest which can be triggered by the backend.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1",
"2",
"3",
"4",
"5",
"6",
"7",
"8",
"9",
"10",
"11",
"12",
"13",
"14",
"15",
"16",
"17",
"18",
"19",
"20"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V7.2 or later version",
"product_ids": [
"1",
"2",
"3",
"4",
"5",
"6",
"7",
"8",
"9",
"10",
"11",
"12",
"13",
"14",
"15",
"16",
"17",
"18",
"19",
"20"
],
"url": "https://support.industry.siemens.com/cs/document/109817007/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.0,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"1",
"2",
"3",
"4",
"5",
"6",
"7",
"8",
"9",
"10",
"11",
"12",
"13",
"14",
"15",
"16",
"17",
"18",
"19",
"20"
]
}
],
"title": "CVE-2022-23036"
},
{
"cve": "CVE-2022-23037",
"cwe": {
"id": "CWE-362",
"name": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)"
},
"notes": [
{
"category": "summary",
"text": "Linux PV device frontends vulnerable to attacks by backends [This CNA information record relates to multiple CVEs; the text explains which aspects/vulnerabilities correspond to which CVE.] Several Linux PV device frontends are using the grant table interfaces for removing access rights of the backends in ways being subject to race conditions, resulting in potential data leaks, data corruption by malicious backends, and denial of service triggered by malicious backends: blkfront, netfront, scsifront and the gntalloc driver are testing whether a grant reference is still in use. If this is not the case, they assume that a following removal of the granted access will always succeed, which is not true in case the backend has mapped the granted page between those two operations. As a result the backend can keep access to the memory page of the guest no matter how the page will be used after the frontend I/O has finished. The xenbus driver has a similar problem, as it doesn\u0027t check the success of removing the granted access of a shared ring buffer. blkfront: CVE-2022-23036 netfront: CVE-2022-23037 scsifront: CVE-2022-23038 gntalloc: CVE-2022-23039 xenbus: CVE-2022-23040 blkfront, netfront, scsifront, usbfront, dmabuf, xenbus, 9p, kbdfront, and pvcalls are using a functionality to delay freeing a grant reference until it is no longer in use, but the freeing of the related data page is not synchronized with dropping the granted access. As a result the backend can keep access to the memory page even after it has been freed and then re-used for a different purpose. CVE-2022-23041 netfront will fail a BUG_ON() assertion if it fails to revoke access in the rx path. This will result in a Denial of Service (DoS) situation of the guest which can be triggered by the backend.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1",
"2",
"3",
"4",
"5",
"6",
"7",
"8",
"9",
"10",
"11",
"12",
"13",
"14",
"15",
"16",
"17",
"18",
"19",
"20"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V7.2 or later version",
"product_ids": [
"1",
"2",
"3",
"4",
"5",
"6",
"7",
"8",
"9",
"10",
"11",
"12",
"13",
"14",
"15",
"16",
"17",
"18",
"19",
"20"
],
"url": "https://support.industry.siemens.com/cs/document/109817007/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.0,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"1",
"2",
"3",
"4",
"5",
"6",
"7",
"8",
"9",
"10",
"11",
"12",
"13",
"14",
"15",
"16",
"17",
"18",
"19",
"20"
]
}
],
"title": "CVE-2022-23037"
},
{
"cve": "CVE-2022-23038",
"cwe": {
"id": "CWE-362",
"name": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)"
},
"notes": [
{
"category": "summary",
"text": "Linux PV device frontends vulnerable to attacks by backends [This CNA information record relates to multiple CVEs; the text explains which aspects/vulnerabilities correspond to which CVE.] Several Linux PV device frontends are using the grant table interfaces for removing access rights of the backends in ways being subject to race conditions, resulting in potential data leaks, data corruption by malicious backends, and denial of service triggered by malicious backends: blkfront, netfront, scsifront and the gntalloc driver are testing whether a grant reference is still in use. If this is not the case, they assume that a following removal of the granted access will always succeed, which is not true in case the backend has mapped the granted page between those two operations. As a result the backend can keep access to the memory page of the guest no matter how the page will be used after the frontend I/O has finished. The xenbus driver has a similar problem, as it doesn\u0027t check the success of removing the granted access of a shared ring buffer. blkfront: CVE-2022-23036 netfront: CVE-2022-23037 scsifront: CVE-2022-23038 gntalloc: CVE-2022-23039 xenbus: CVE-2022-23040 blkfront, netfront, scsifront, usbfront, dmabuf, xenbus, 9p, kbdfront, and pvcalls are using a functionality to delay freeing a grant reference until it is no longer in use, but the freeing of the related data page is not synchronized with dropping the granted access. As a result the backend can keep access to the memory page even after it has been freed and then re-used for a different purpose. CVE-2022-23041 netfront will fail a BUG_ON() assertion if it fails to revoke access in the rx path. This will result in a Denial of Service (DoS) situation of the guest which can be triggered by the backend.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1",
"2",
"3",
"4",
"5",
"6",
"7",
"8",
"9",
"10",
"11",
"12",
"13",
"14",
"15",
"16",
"17",
"18",
"19",
"20"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V7.2 or later version",
"product_ids": [
"1",
"2",
"3",
"4",
"5",
"6",
"7",
"8",
"9",
"10",
"11",
"12",
"13",
"14",
"15",
"16",
"17",
"18",
"19",
"20"
],
"url": "https://support.industry.siemens.com/cs/document/109817007/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.0,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"1",
"2",
"3",
"4",
"5",
"6",
"7",
"8",
"9",
"10",
"11",
"12",
"13",
"14",
"15",
"16",
"17",
"18",
"19",
"20"
]
}
],
"title": "CVE-2022-23038"
},
{
"cve": "CVE-2022-23039",
"cwe": {
"id": "CWE-362",
"name": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)"
},
"notes": [
{
"category": "summary",
"text": "Linux PV device frontends vulnerable to attacks by backends [This CNA information record relates to multiple CVEs; the text explains which aspects/vulnerabilities correspond to which CVE.] Several Linux PV device frontends are using the grant table interfaces for removing access rights of the backends in ways being subject to race conditions, resulting in potential data leaks, data corruption by malicious backends, and denial of service triggered by malicious backends: blkfront, netfront, scsifront and the gntalloc driver are testing whether a grant reference is still in use. If this is not the case, they assume that a following removal of the granted access will always succeed, which is not true in case the backend has mapped the granted page between those two operations. As a result the backend can keep access to the memory page of the guest no matter how the page will be used after the frontend I/O has finished. The xenbus driver has a similar problem, as it doesn\u0027t check the success of removing the granted access of a shared ring buffer. blkfront: CVE-2022-23036 netfront: CVE-2022-23037 scsifront: CVE-2022-23038 gntalloc: CVE-2022-23039 xenbus: CVE-2022-23040 blkfront, netfront, scsifront, usbfront, dmabuf, xenbus, 9p, kbdfront, and pvcalls are using a functionality to delay freeing a grant reference until it is no longer in use, but the freeing of the related data page is not synchronized with dropping the granted access. As a result the backend can keep access to the memory page even after it has been freed and then re-used for a different purpose. CVE-2022-23041 netfront will fail a BUG_ON() assertion if it fails to revoke access in the rx path. This will result in a Denial of Service (DoS) situation of the guest which can be triggered by the backend.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1",
"2",
"3",
"4",
"5",
"6",
"7",
"8",
"9",
"10",
"11",
"12",
"13",
"14",
"15",
"16",
"17",
"18",
"19",
"20"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V7.2 or later version",
"product_ids": [
"1",
"2",
"3",
"4",
"5",
"6",
"7",
"8",
"9",
"10",
"11",
"12",
"13",
"14",
"15",
"16",
"17",
"18",
"19",
"20"
],
"url": "https://support.industry.siemens.com/cs/document/109817007/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.0,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"1",
"2",
"3",
"4",
"5",
"6",
"7",
"8",
"9",
"10",
"11",
"12",
"13",
"14",
"15",
"16",
"17",
"18",
"19",
"20"
]
}
],
"title": "CVE-2022-23039"
},
{
"cve": "CVE-2022-23040",
"cwe": {
"id": "CWE-362",
"name": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)"
},
"notes": [
{
"category": "summary",
"text": "Linux PV device frontends vulnerable to attacks by backends [This CNA information record relates to multiple CVEs; the text explains which aspects/vulnerabilities correspond to which CVE.] Several Linux PV device frontends are using the grant table interfaces for removing access rights of the backends in ways being subject to race conditions, resulting in potential data leaks, data corruption by malicious backends, and denial of service triggered by malicious backends: blkfront, netfront, scsifront and the gntalloc driver are testing whether a grant reference is still in use. If this is not the case, they assume that a following removal of the granted access will always succeed, which is not true in case the backend has mapped the granted page between those two operations. As a result the backend can keep access to the memory page of the guest no matter how the page will be used after the frontend I/O has finished. The xenbus driver has a similar problem, as it doesn\u0027t check the success of removing the granted access of a shared ring buffer. blkfront: CVE-2022-23036 netfront: CVE-2022-23037 scsifront: CVE-2022-23038 gntalloc: CVE-2022-23039 xenbus: CVE-2022-23040 blkfront, netfront, scsifront, usbfront, dmabuf, xenbus, 9p, kbdfront, and pvcalls are using a functionality to delay freeing a grant reference until it is no longer in use, but the freeing of the related data page is not synchronized with dropping the granted access. As a result the backend can keep access to the memory page even after it has been freed and then re-used for a different purpose. CVE-2022-23041 netfront will fail a BUG_ON() assertion if it fails to revoke access in the rx path. This will result in a Denial of Service (DoS) situation of the guest which can be triggered by the backend.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1",
"2",
"3",
"4",
"5",
"6",
"7",
"8",
"9",
"10",
"11",
"12",
"13",
"14",
"15",
"16",
"17",
"18",
"19",
"20"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V7.2 or later version",
"product_ids": [
"1",
"2",
"3",
"4",
"5",
"6",
"7",
"8",
"9",
"10",
"11",
"12",
"13",
"14",
"15",
"16",
"17",
"18",
"19",
"20"
],
"url": "https://support.industry.siemens.com/cs/document/109817007/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.0,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"1",
"2",
"3",
"4",
"5",
"6",
"7",
"8",
"9",
"10",
"11",
"12",
"13",
"14",
"15",
"16",
"17",
"18",
"19",
"20"
]
}
],
"title": "CVE-2022-23040"
},
{
"cve": "CVE-2022-23041",
"cwe": {
"id": "CWE-362",
"name": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)"
},
"notes": [
{
"category": "summary",
"text": "Linux PV device frontends vulnerable to attacks by backends [This CNA information record relates to multiple CVEs; the text explains which aspects/vulnerabilities correspond to which CVE.] Several Linux PV device frontends are using the grant table interfaces for removing access rights of the backends in ways being subject to race conditions, resulting in potential data leaks, data corruption by malicious backends, and denial of service triggered by malicious backends: blkfront, netfront, scsifront and the gntalloc driver are testing whether a grant reference is still in use. If this is not the case, they assume that a following removal of the granted access will always succeed, which is not true in case the backend has mapped the granted page between those two operations. As a result the backend can keep access to the memory page of the guest no matter how the page will be used after the frontend I/O has finished. The xenbus driver has a similar problem, as it doesn\u0027t check the success of removing the granted access of a shared ring buffer. blkfront: CVE-2022-23036 netfront: CVE-2022-23037 scsifront: CVE-2022-23038 gntalloc: CVE-2022-23039 xenbus: CVE-2022-23040 blkfront, netfront, scsifront, usbfront, dmabuf, xenbus, 9p, kbdfront, and pvcalls are using a functionality to delay freeing a grant reference until it is no longer in use, but the freeing of the related data page is not synchronized with dropping the granted access. As a result the backend can keep access to the memory page even after it has been freed and then re-used for a different purpose. CVE-2022-23041 netfront will fail a BUG_ON() assertion if it fails to revoke access in the rx path. This will result in a Denial of Service (DoS) situation of the guest which can be triggered by the backend.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1",
"2",
"3",
"4",
"5",
"6",
"7",
"8",
"9",
"10",
"11",
"12",
"13",
"14",
"15",
"16",
"17",
"18",
"19",
"20"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V7.2 or later version",
"product_ids": [
"1",
"2",
"3",
"4",
"5",
"6",
"7",
"8",
"9",
"10",
"11",
"12",
"13",
"14",
"15",
"16",
"17",
"18",
"19",
"20"
],
"url": "https://support.industry.siemens.com/cs/document/109817007/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.0,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"1",
"2",
"3",
"4",
"5",
"6",
"7",
"8",
"9",
"10",
"11",
"12",
"13",
"14",
"15",
"16",
"17",
"18",
"19",
"20"
]
}
],
"title": "CVE-2022-23041"
},
{
"cve": "CVE-2022-23042",
"cwe": {
"id": "CWE-362",
"name": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)"
},
"notes": [
{
"category": "summary",
"text": "Linux PV device frontends vulnerable to attacks by backends [This CNA information record relates to multiple CVEs; the text explains which aspects/vulnerabilities correspond to which CVE.] Several Linux PV device frontends are using the grant table interfaces for removing access rights of the backends in ways being subject to race conditions, resulting in potential data leaks, data corruption by malicious backends, and denial of service triggered by malicious backends: blkfront, netfront, scsifront and the gntalloc driver are testing whether a grant reference is still in use. If this is not the case, they assume that a following removal of the granted access will always succeed, which is not true in case the backend has mapped the granted page between those two operations. As a result the backend can keep access to the memory page of the guest no matter how the page will be used after the frontend I/O has finished. The xenbus driver has a similar problem, as it doesn\u0027t check the success of removing the granted access of a shared ring buffer. blkfront: CVE-2022-23036 netfront: CVE-2022-23037 scsifront: CVE-2022-23038 gntalloc: CVE-2022-23039 xenbus: CVE-2022-23040 blkfront, netfront, scsifront, usbfront, dmabuf, xenbus, 9p, kbdfront, and pvcalls are using a functionality to delay freeing a grant reference until it is no longer in use, but the freeing of the related data page is not synchronized with dropping the granted access. As a result the backend can keep access to the memory page even after it has been freed and then re-used for a different purpose. CVE-2022-23041 netfront will fail a BUG_ON() assertion if it fails to revoke access in the rx path. This will result in a Denial of Service (DoS) situation of the guest which can be triggered by the backend.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1",
"2",
"3",
"4",
"5",
"6",
"7",
"8",
"9",
"10",
"11",
"12",
"13",
"14",
"15",
"16",
"17",
"18",
"19",
"20"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V7.2 or later version",
"product_ids": [
"1",
"2",
"3",
"4",
"5",
"6",
"7",
"8",
"9",
"10",
"11",
"12",
"13",
"14",
"15",
"16",
"17",
"18",
"19",
"20"
],
"url": "https://support.industry.siemens.com/cs/document/109817007/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.0,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"1",
"2",
"3",
"4",
"5",
"6",
"7",
"8",
"9",
"10",
"11",
"12",
"13",
"14",
"15",
"16",
"17",
"18",
"19",
"20"
]
}
],
"title": "CVE-2022-23042"
},
{
"cve": "CVE-2022-23308",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"notes": [
{
"category": "summary",
"text": "valid.c in libxml2 before 2.9.13 has a use-after-free of ID and IDREF attributes.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1",
"2",
"3",
"4",
"5",
"6",
"7",
"8",
"9",
"10",
"11",
"12",
"13",
"14",
"15",
"16",
"17",
"18",
"19",
"20"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V7.2 or later version",
"product_ids": [
"1",
"2",
"3",
"4",
"5",
"6",
"7",
"8",
"9",
"10",
"11",
"12",
"13",
"14",
"15",
"16",
"17",
"18",
"19",
"20"
],
"url": "https://support.industry.siemens.com/cs/document/109817007/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"1",
"2",
"3",
"4",
"5",
"6",
"7",
"8",
"9",
"10",
"11",
"12",
"13",
"14",
"15",
"16",
"17",
"18",
"19",
"20"
]
}
],
"title": "CVE-2022-23308"
},
{
"cve": "CVE-2022-26490",
"cwe": {
"id": "CWE-120",
"name": "Buffer Copy without Checking Size of Input (\u0027Classic Buffer Overflow\u0027)"
},
"notes": [
{
"category": "summary",
"text": "st21nfca_connectivity_event_received in drivers/nfc/st21nfca/se.c in the Linux kernel through 5.16.12 has EVT_TRANSACTION buffer overflows because of untrusted length parameters.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1",
"2",
"3",
"4",
"5",
"6",
"7",
"8",
"9",
"10",
"11",
"12",
"13",
"14",
"15",
"16",
"17",
"18",
"19",
"20"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V7.2 or later version",
"product_ids": [
"1",
"2",
"3",
"4",
"5",
"6",
"7",
"8",
"9",
"10",
"11",
"12",
"13",
"14",
"15",
"16",
"17",
"18",
"19",
"20"
],
"url": "https://support.industry.siemens.com/cs/document/109817007/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"1",
"2",
"3",
"4",
"5",
"6",
"7",
"8",
"9",
"10",
"11",
"12",
"13",
"14",
"15",
"16",
"17",
"18",
"19",
"20"
]
}
],
"title": "CVE-2022-26490"
},
{
"cve": "CVE-2022-28356",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel before 5.17.1, a refcount leak bug was found in net/llc/af_llc.c.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1",
"2",
"3",
"4",
"5",
"6",
"7",
"8",
"9",
"10",
"11",
"12",
"13",
"14",
"15",
"16",
"17",
"18",
"19",
"20"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V7.2 or later version",
"product_ids": [
"1",
"2",
"3",
"4",
"5",
"6",
"7",
"8",
"9",
"10",
"11",
"12",
"13",
"14",
"15",
"16",
"17",
"18",
"19",
"20"
],
"url": "https://support.industry.siemens.com/cs/document/109817007/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"1",
"2",
"3",
"4",
"5",
"6",
"7",
"8",
"9",
"10",
"11",
"12",
"13",
"14",
"15",
"16",
"17",
"18",
"19",
"20"
]
}
],
"title": "CVE-2022-28356"
},
{
"cve": "CVE-2022-28390",
"cwe": {
"id": "CWE-415",
"name": "Double Free"
},
"notes": [
{
"category": "summary",
"text": "ems_usb_start_xmit in drivers/net/can/usb/ems_usb.c in the Linux kernel through 5.17.1 has a double free.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1",
"2",
"3",
"4",
"5",
"6",
"7",
"8",
"9",
"10",
"11",
"12",
"13",
"14",
"15",
"16",
"17",
"18",
"19",
"20"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V7.2 or later version",
"product_ids": [
"1",
"2",
"3",
"4",
"5",
"6",
"7",
"8",
"9",
"10",
"11",
"12",
"13",
"14",
"15",
"16",
"17",
"18",
"19",
"20"
],
"url": "https://support.industry.siemens.com/cs/document/109817007/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"1",
"2",
"3",
"4",
"5",
"6",
"7",
"8",
"9",
"10",
"11",
"12",
"13",
"14",
"15",
"16",
"17",
"18",
"19",
"20"
]
}
],
"title": "CVE-2022-28390"
},
{
"cve": "CVE-2022-30065",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"notes": [
{
"category": "summary",
"text": "A use-after-free in Busybox 1.35-x\u0027s awk applet leads to denial of service and possibly code execution when processing a crafted awk pattern in the copyvar function.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1",
"2",
"3",
"4",
"5",
"6",
"7",
"8",
"9",
"10",
"11",
"12",
"13",
"14",
"15",
"16",
"17",
"18",
"19",
"20"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V7.2 or later version",
"product_ids": [
"1",
"2",
"3",
"4",
"5",
"6",
"7",
"8",
"9",
"10",
"11",
"12",
"13",
"14",
"15",
"16",
"17",
"18",
"19",
"20"
],
"url": "https://support.industry.siemens.com/cs/document/109817007/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"1",
"2",
"3",
"4",
"5",
"6",
"7",
"8",
"9",
"10",
"11",
"12",
"13",
"14",
"15",
"16",
"17",
"18",
"19",
"20"
]
}
],
"title": "CVE-2022-30065"
},
{
"cve": "CVE-2022-30594",
"cwe": {
"id": "CWE-863",
"name": "Incorrect Authorization"
},
"notes": [
{
"category": "summary",
"text": "The Linux kernel before 5.17.2 mishandles seccomp permissions. The PTRACE_SEIZE code path allows attackers to bypass intended restrictions on setting the PT_SUSPEND_SECCOMP flag.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1",
"2",
"3",
"4",
"5",
"6",
"7",
"8",
"9",
"10",
"11",
"12",
"13",
"14",
"15",
"16",
"17",
"18",
"19",
"20"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V7.2 or later version",
"product_ids": [
"1",
"2",
"3",
"4",
"5",
"6",
"7",
"8",
"9",
"10",
"11",
"12",
"13",
"14",
"15",
"16",
"17",
"18",
"19",
"20"
],
"url": "https://support.industry.siemens.com/cs/document/109817007/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"1",
"2",
"3",
"4",
"5",
"6",
"7",
"8",
"9",
"10",
"11",
"12",
"13",
"14",
"15",
"16",
"17",
"18",
"19",
"20"
]
}
],
"title": "CVE-2022-30594"
},
{
"cve": "CVE-2022-32205",
"cwe": {
"id": "CWE-770",
"name": "Allocation of Resources Without Limits or Throttling"
},
"notes": [
{
"category": "summary",
"text": "A malicious server can serve excessive amounts of \"Set-Cookie:\" headers in a HTTP response to curl and curl \u003c 7.84.0 stores all of them. A sufficiently large amount of (big) cookies make subsequent HTTP requests to this, or other servers to which the cookies match, create requests that become larger than the threshold that curl uses internally to avoid sending crazy large requests (1048576 bytes) and instead returns an error.This denial state might remain for as long as the same cookies are kept, match and haven\u0027t expired. Due to cookie matching rules, a server on \"foo.example.com\" can set cookies that also would match for \"bar.example.com\", making it it possible for a \"sister server\" to effectively cause a denial of service for a sibling site on the same second level domain using this method.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1",
"2",
"3",
"4",
"5",
"6",
"7",
"8",
"9",
"10",
"11",
"12",
"13",
"14",
"15",
"16",
"17",
"18",
"19",
"20"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V7.2 or later version",
"product_ids": [
"1",
"2",
"3",
"4",
"5",
"6",
"7",
"8",
"9",
"10",
"11",
"12",
"13",
"14",
"15",
"16",
"17",
"18",
"19",
"20"
],
"url": "https://support.industry.siemens.com/cs/document/109817007/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"1",
"2",
"3",
"4",
"5",
"6",
"7",
"8",
"9",
"10",
"11",
"12",
"13",
"14",
"15",
"16",
"17",
"18",
"19",
"20"
]
}
],
"title": "CVE-2022-32205"
},
{
"cve": "CVE-2022-32206",
"cwe": {
"id": "CWE-770",
"name": "Allocation of Resources Without Limits or Throttling"
},
"notes": [
{
"category": "summary",
"text": "curl \u003c 7.84.0 supports \"chained\" HTTP compression algorithms, meaning that a serverresponse can be compressed multiple times and potentially with different algorithms. The number of acceptable \"links\" in this \"decompression chain\" was unbounded, allowing a malicious server to insert a virtually unlimited number of compression steps.The use of such a decompression chain could result in a \"malloc bomb\", makingcurl end up spending enormous amounts of allocated heap memory, or trying toand returning out of memory errors.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1",
"2",
"3",
"4",
"5",
"6",
"7",
"8",
"9",
"10",
"11",
"12",
"13",
"14",
"15",
"16",
"17",
"18",
"19",
"20"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V7.2 or later version",
"product_ids": [
"1",
"2",
"3",
"4",
"5",
"6",
"7",
"8",
"9",
"10",
"11",
"12",
"13",
"14",
"15",
"16",
"17",
"18",
"19",
"20"
],
"url": "https://support.industry.siemens.com/cs/document/109817007/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"1",
"2",
"3",
"4",
"5",
"6",
"7",
"8",
"9",
"10",
"11",
"12",
"13",
"14",
"15",
"16",
"17",
"18",
"19",
"20"
]
}
],
"title": "CVE-2022-32206"
},
{
"cve": "CVE-2022-32207",
"cwe": {
"id": "CWE-276",
"name": "Incorrect Default Permissions"
},
"notes": [
{
"category": "summary",
"text": "When curl \u003c 7.84.0 saves cookies, alt-svc and hsts data to local files, it makes the operation atomic by finalizing the operation with a rename from a temporary name to the final target file name.In that rename operation, it might accidentally *widen* the permissions for the target file, leaving the updated file accessible to more users than intended.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1",
"2",
"3",
"4",
"5",
"6",
"7",
"8",
"9",
"10",
"11",
"12",
"13",
"14",
"15",
"16",
"17",
"18",
"19",
"20"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V7.2 or later version",
"product_ids": [
"1",
"2",
"3",
"4",
"5",
"6",
"7",
"8",
"9",
"10",
"11",
"12",
"13",
"14",
"15",
"16",
"17",
"18",
"19",
"20"
],
"url": "https://support.industry.siemens.com/cs/document/109817007/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"1",
"2",
"3",
"4",
"5",
"6",
"7",
"8",
"9",
"10",
"11",
"12",
"13",
"14",
"15",
"16",
"17",
"18",
"19",
"20"
]
}
],
"title": "CVE-2022-32207"
},
{
"cve": "CVE-2022-32208",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"notes": [
{
"category": "summary",
"text": "When curl \u003c 7.84.0 does FTP transfers secured by krb5, it handles message verification failures wrongly. This flaw makes it possible for a Man-In-The-Middle attack to go unnoticed and even allows it to inject data to the client.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1",
"2",
"3",
"4",
"5",
"6",
"7",
"8",
"9",
"10",
"11",
"12",
"13",
"14",
"15",
"16",
"17",
"18",
"19",
"20"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V7.2 or later version",
"product_ids": [
"1",
"2",
"3",
"4",
"5",
"6",
"7",
"8",
"9",
"10",
"11",
"12",
"13",
"14",
"15",
"16",
"17",
"18",
"19",
"20"
],
"url": "https://support.industry.siemens.com/cs/document/109817007/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"1",
"2",
"3",
"4",
"5",
"6",
"7",
"8",
"9",
"10",
"11",
"12",
"13",
"14",
"15",
"16",
"17",
"18",
"19",
"20"
]
}
],
"title": "CVE-2022-32208"
},
{
"cve": "CVE-2022-32296",
"cwe": {
"id": "CWE-203",
"name": "Observable Discrepancy"
},
"notes": [
{
"category": "summary",
"text": "The Linux kernel before 5.17.9 allows TCP servers to identify clients by observing what source ports are used. This occurs because of use of Algorithm 4 (\"Double-Hash Port Selection Algorithm\") of RFC 6056.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1",
"2",
"3",
"4",
"5",
"6",
"7",
"8",
"9",
"10",
"11",
"12",
"13",
"14",
"15",
"16",
"17",
"18",
"19",
"20"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V7.2 or later version",
"product_ids": [
"1",
"2",
"3",
"4",
"5",
"6",
"7",
"8",
"9",
"10",
"11",
"12",
"13",
"14",
"15",
"16",
"17",
"18",
"19",
"20"
],
"url": "https://support.industry.siemens.com/cs/document/109817007/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.3,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"1",
"2",
"3",
"4",
"5",
"6",
"7",
"8",
"9",
"10",
"11",
"12",
"13",
"14",
"15",
"16",
"17",
"18",
"19",
"20"
]
}
],
"title": "CVE-2022-32296"
},
{
"cve": "CVE-2022-32981",
"cwe": {
"id": "CWE-120",
"name": "Buffer Copy without Checking Size of Input (\u0027Classic Buffer Overflow\u0027)"
},
"notes": [
{
"category": "summary",
"text": "An issue was discovered in the Linux kernel through 5.18.3 on powerpc 32-bit platforms. There is a buffer overflow in ptrace PEEKUSER and POKEUSER (aka PEEKUSR and POKEUSR) when accessing floating point registers.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1",
"2",
"3",
"4",
"5",
"6",
"7",
"8",
"9",
"10",
"11",
"12",
"13",
"14",
"15",
"16",
"17",
"18",
"19",
"20"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V7.2 or later version",
"product_ids": [
"1",
"2",
"3",
"4",
"5",
"6",
"7",
"8",
"9",
"10",
"11",
"12",
"13",
"14",
"15",
"16",
"17",
"18",
"19",
"20"
],
"url": "https://support.industry.siemens.com/cs/document/109817007/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"1",
"2",
"3",
"4",
"5",
"6",
"7",
"8",
"9",
"10",
"11",
"12",
"13",
"14",
"15",
"16",
"17",
"18",
"19",
"20"
]
}
],
"title": "CVE-2022-32981"
},
{
"cve": "CVE-2022-33981",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"notes": [
{
"category": "summary",
"text": "drivers/block/floppy.c in the Linux kernel before 5.17.6 is vulnerable to a denial of service, because of a concurrency use-after-free flaw after deallocating raw_cmd in the raw_cmd_ioctl function.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1",
"2",
"3",
"4",
"5",
"6",
"7",
"8",
"9",
"10",
"11",
"12",
"13",
"14",
"15",
"16",
"17",
"18",
"19",
"20"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V7.2 or later version",
"product_ids": [
"1",
"2",
"3",
"4",
"5",
"6",
"7",
"8",
"9",
"10",
"11",
"12",
"13",
"14",
"15",
"16",
"17",
"18",
"19",
"20"
],
"url": "https://support.industry.siemens.com/cs/document/109817007/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.3,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"1",
"2",
"3",
"4",
"5",
"6",
"7",
"8",
"9",
"10",
"11",
"12",
"13",
"14",
"15",
"16",
"17",
"18",
"19",
"20"
]
}
],
"title": "CVE-2022-33981"
},
{
"cve": "CVE-2022-35252",
"cwe": {
"id": "CWE-1286",
"name": "Improper Validation of Syntactic Correctness of Input"
},
"notes": [
{
"category": "summary",
"text": "When curl is used to retrieve and parse cookies from a HTTP(S) server, itaccepts cookies using control codes that when later are sent back to a HTTPserver might make the server return 400 responses. Effectively allowing a\"sister site\" to deny service to all siblings.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1",
"2",
"3",
"4",
"5",
"6",
"7",
"8",
"9",
"10",
"11",
"12",
"13",
"14",
"15",
"16",
"17",
"18",
"19",
"20"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V7.2 or later version",
"product_ids": [
"1",
"2",
"3",
"4",
"5",
"6",
"7",
"8",
"9",
"10",
"11",
"12",
"13",
"14",
"15",
"16",
"17",
"18",
"19",
"20"
],
"url": "https://support.industry.siemens.com/cs/document/109817007/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C",
"version": "3.1"
},
"products": [
"1",
"2",
"3",
"4",
"5",
"6",
"7",
"8",
"9",
"10",
"11",
"12",
"13",
"14",
"15",
"16",
"17",
"18",
"19",
"20"
]
}
],
"title": "CVE-2022-35252"
},
{
"cve": "CVE-2022-36879",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "summary",
"text": "An issue was discovered in the Linux kernel through 5.18.14. xfrm_expand_policies in net/xfrm/xfrm_policy.c can cause a refcount to be dropped twice.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1",
"2",
"3",
"4",
"5",
"6",
"7",
"8",
"9",
"10",
"11",
"12",
"13",
"14",
"15",
"16",
"17",
"18",
"19",
"20"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V7.2 or later version",
"product_ids": [
"1",
"2",
"3",
"4",
"5",
"6",
"7",
"8",
"9",
"10",
"11",
"12",
"13",
"14",
"15",
"16",
"17",
"18",
"19",
"20"
],
"url": "https://support.industry.siemens.com/cs/document/109817007/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"1",
"2",
"3",
"4",
"5",
"6",
"7",
"8",
"9",
"10",
"11",
"12",
"13",
"14",
"15",
"16",
"17",
"18",
"19",
"20"
]
}
],
"title": "CVE-2022-36879"
},
{
"cve": "CVE-2022-36946",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "summary",
"text": "nfqnl_mangle in net/netfilter/nfnetlink_queue.c in the Linux kernel through 5.18.14 allows remote attackers to cause a denial of service (panic) because, in the case of an nf_queue verdict with a one-byte nfta_payload attribute, an skb_pull can encounter a negative skb-\u003elen.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1",
"2",
"3",
"4",
"5",
"6",
"7",
"8",
"9",
"10",
"11",
"12",
"13",
"14",
"15",
"16",
"17",
"18",
"19",
"20"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V7.2 or later version",
"product_ids": [
"1",
"2",
"3",
"4",
"5",
"6",
"7",
"8",
"9",
"10",
"11",
"12",
"13",
"14",
"15",
"16",
"17",
"18",
"19",
"20"
],
"url": "https://support.industry.siemens.com/cs/document/109817007/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"1",
"2",
"3",
"4",
"5",
"6",
"7",
"8",
"9",
"10",
"11",
"12",
"13",
"14",
"15",
"16",
"17",
"18",
"19",
"20"
]
}
],
"title": "CVE-2022-36946"
}
]
}
SSA-565386
Vulnerability from csaf_siemens - Published: 2023-03-14 00:00 - Updated: 2023-03-14 00:00Notes
{
"document": {
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Disclosure is not limited. (TLPv2: TLP:CLEAR)",
"tlp": {
"label": "WHITE"
}
},
"notes": [
{
"category": "summary",
"text": "Multiple vulnerabilities affecting various third-party components of SCALANCE W-700 IEEE 802.11ax devices before V2.0 could allow an attacker to cause a denial of service condition, disclose sensitive data or violate the system integrity.\n\nSiemens has released an update for SCALANCE W-700 IEEE 802.11ax and recommends to update to the latest version.",
"title": "Summary"
},
{
"category": "general",
"text": "As a general security measure, Siemens strongly recommends to protect network access to devices with appropriate mechanisms. In order to operate the devices in a protected IT environment, Siemens recommends to configure the environment according to Siemens\u0027 operational guidelines for Industrial Security (Download: \nhttps://www.siemens.com/cert/operational-guidelines-industrial-security), and to follow the recommendations in the product manuals.\nAdditional information on Industrial Security by Siemens can be found at: https://www.siemens.com/industrialsecurity",
"title": "General Recommendations"
},
{
"category": "general",
"text": "For further inquiries on security vulnerabilities in Siemens products and solutions, please contact the Siemens ProductCERT: https://www.siemens.com/cert/advisories",
"title": "Additional Resources"
},
{
"category": "legal_disclaimer",
"text": "Siemens Security Advisories are subject to the terms and conditions contained in Siemens\u0027 underlying license terms or other applicable agreements previously agreed to with Siemens (hereinafter \"License Terms\"). To the extent applicable to information, software or documentation made available in or through a Siemens Security Advisory, the Terms of Use of Siemens\u0027 Global Website (https://www.siemens.com/terms_of_use, hereinafter \"Terms of Use\"), in particular Sections 8-10 of the Terms of Use, shall apply additionally. In case of conflicts, the License Terms shall prevail over the Terms of Use.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "productcert@siemens.com",
"name": "Siemens ProductCERT",
"namespace": "https://www.siemens.com"
},
"references": [
{
"category": "self",
"summary": "SSA-565386: Third-Party Component Vulnerabilities in SCALANCE W-700 IEEE 802.11ax devices before V2.0 - PDF Version",
"url": "https://cert-portal.siemens.com/productcert/pdf/ssa-565386.pdf"
},
{
"category": "self",
"summary": "SSA-565386: Third-Party Component Vulnerabilities in SCALANCE W-700 IEEE 802.11ax devices before V2.0 - TXT Version",
"url": "https://cert-portal.siemens.com/productcert/txt/ssa-565386.txt"
},
{
"category": "self",
"summary": "SSA-565386: Third-Party Component Vulnerabilities in SCALANCE W-700 IEEE 802.11ax devices before V2.0 - CSAF Version",
"url": "https://cert-portal.siemens.com/productcert/csaf/ssa-565386.json"
}
],
"title": "SSA-565386: Third-Party Component Vulnerabilities in SCALANCE W-700 IEEE 802.11ax devices before V2.0",
"tracking": {
"current_release_date": "2023-03-14T00:00:00Z",
"generator": {
"engine": {
"name": "Siemens ProductCERT CSAF Generator",
"version": "1"
}
},
"id": "SSA-565386",
"initial_release_date": "2023-03-14T00:00:00Z",
"revision_history": [
{
"date": "2023-03-14T00:00:00Z",
"legacy_version": "1.0",
"number": "1",
"summary": "Publication Date"
}
],
"status": "interim",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c V2.0",
"product": {
"name": "SCALANCE WAM763-1 (6GK5763-1AL00-7DA0)",
"product_id": "1",
"product_identification_helper": {
"model_numbers": [
"6GK5763-1AL00-7DA0"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE WAM763-1 (6GK5763-1AL00-7DA0)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c V2.0",
"product": {
"name": "SCALANCE WAM766-1 (EU) (6GK5766-1GE00-7DA0)",
"product_id": "2",
"product_identification_helper": {
"model_numbers": [
"6GK5766-1GE00-7DA0"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE WAM766-1 (EU) (6GK5766-1GE00-7DA0)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c V2.0",
"product": {
"name": "SCALANCE WAM766-1 (US) (6GK5766-1GE00-7DB0)",
"product_id": "3",
"product_identification_helper": {
"model_numbers": [
"6GK5766-1GE00-7DB0"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE WAM766-1 (US) (6GK5766-1GE00-7DB0)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c V2.0",
"product": {
"name": "SCALANCE WAM766-1 EEC (EU) (6GK5766-1GE00-7TA0)",
"product_id": "4",
"product_identification_helper": {
"model_numbers": [
"6GK5766-1GE00-7TA0"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE WAM766-1 EEC (EU) (6GK5766-1GE00-7TA0)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c V2.0",
"product": {
"name": "SCALANCE WAM766-1 EEC (US) (6GK5766-1GE00-7TB0)",
"product_id": "5",
"product_identification_helper": {
"model_numbers": [
"6GK5766-1GE00-7TB0"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE WAM766-1 EEC (US) (6GK5766-1GE00-7TB0)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c V2.0",
"product": {
"name": "SCALANCE WUM763-1 (6GK5763-1AL00-3DA0)",
"product_id": "6",
"product_identification_helper": {
"model_numbers": [
"6GK5763-1AL00-3DA0"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE WUM763-1 (6GK5763-1AL00-3DA0)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c V2.0",
"product": {
"name": "SCALANCE WUM763-1 (6GK5763-1AL00-3AA0)",
"product_id": "7",
"product_identification_helper": {
"model_numbers": [
"6GK5763-1AL00-3AA0"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE WUM763-1 (6GK5763-1AL00-3AA0)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c V2.0",
"product": {
"name": "SCALANCE WUM766-1 (EU) (6GK5766-1GE00-3DA0)",
"product_id": "8",
"product_identification_helper": {
"model_numbers": [
"6GK5766-1GE00-3DA0"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE WUM766-1 (EU) (6GK5766-1GE00-3DA0)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c V2.0",
"product": {
"name": "SCALANCE WUM766-1 (US) (6GK5766-1GE00-3DB0)",
"product_id": "9",
"product_identification_helper": {
"model_numbers": [
"6GK5766-1GE00-3DB0"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE WUM766-1 (US) (6GK5766-1GE00-3DB0)"
}
],
"category": "vendor",
"name": "Siemens"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2018-12886",
"cwe": {
"id": "CWE-209",
"name": "Generation of Error Message Containing Sensitive Information"
},
"notes": [
{
"category": "summary",
"text": "stack_protect_prologue in cfgexpand.c and stack_protect_epilogue in function.c in GNU Compiler Collection (GCC) 4.1 through 8 (under certain circumstances) generate instruction sequences when targeting ARM targets that spill the address of the stack protector guard, which allows an attacker to bypass the protection of -fstack-protector, -fstack-protector-all, -fstack-protector-strong, and -fstack-protector-explicit against stack overflow by controlling what the stack canary is compared against.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1",
"2",
"3",
"4",
"5",
"7",
"6",
"8",
"9"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V2.0 or later version",
"product_ids": [
"1",
"2",
"3",
"4",
"5",
"7",
"6",
"8",
"9"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109815650/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.1,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"1",
"2",
"3",
"4",
"5",
"7",
"6",
"8",
"9"
]
}
],
"title": "CVE-2018-12886"
},
{
"cve": "CVE-2018-25032",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"notes": [
{
"category": "summary",
"text": "zlib before 1.2.12 allows memory corruption when deflating (i.e., when compressing) if the input has many distant matches.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1",
"2",
"3",
"4",
"5",
"7",
"6",
"8",
"9"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V2.0 or later version",
"product_ids": [
"1",
"2",
"3",
"4",
"5",
"7",
"6",
"8",
"9"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109815650/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"1",
"2",
"3",
"4",
"5",
"7",
"6",
"8",
"9"
]
}
],
"title": "CVE-2018-25032"
},
{
"cve": "CVE-2021-42373",
"cwe": {
"id": "CWE-476",
"name": "NULL Pointer Dereference"
},
"notes": [
{
"category": "summary",
"text": "A NULL pointer dereference in Busybox\u0027s man applet leads to denial of service when a section name is supplied but no page argument is given.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1",
"2",
"3",
"4",
"5",
"7",
"6",
"8",
"9"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V2.0 or later version",
"product_ids": [
"1",
"2",
"3",
"4",
"5",
"7",
"6",
"8",
"9"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109815650/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.1,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"1",
"2",
"3",
"4",
"5",
"7",
"6",
"8",
"9"
]
}
],
"title": "CVE-2021-42373"
},
{
"cve": "CVE-2021-42374",
"cwe": {
"id": "CWE-125",
"name": "Out-of-bounds Read"
},
"notes": [
{
"category": "summary",
"text": "An out-of-bounds heap read in Busybox\u0027s unlzma applet leads to information leak and denial of service when crafted LZMA-compressed input is decompressed. This can be triggered by any applet/format that internally supports LZMA compression.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1",
"2",
"3",
"4",
"5",
"7",
"6",
"8",
"9"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V2.0 or later version",
"product_ids": [
"1",
"2",
"3",
"4",
"5",
"7",
"6",
"8",
"9"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109815650/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"1",
"2",
"3",
"4",
"5",
"7",
"6",
"8",
"9"
]
}
],
"title": "CVE-2021-42374"
},
{
"cve": "CVE-2021-42375",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "summary",
"text": "An incorrect handling of a special element in Busybox\u0027s ash applet leads to denial of service when processing a crafted shell command, due to the shell mistaking specific characters for reserved characters. This may be used for DoS under rare conditions of filtered command input.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1",
"2",
"3",
"4",
"5",
"7",
"6",
"8",
"9"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V2.0 or later version",
"product_ids": [
"1",
"2",
"3",
"4",
"5",
"7",
"6",
"8",
"9"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109815650/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.1,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"1",
"2",
"3",
"4",
"5",
"7",
"6",
"8",
"9"
]
}
],
"title": "CVE-2021-42375"
},
{
"cve": "CVE-2021-42376",
"cwe": {
"id": "CWE-476",
"name": "NULL Pointer Dereference"
},
"notes": [
{
"category": "summary",
"text": "A NULL pointer dereference in Busybox\u0027s hush applet leads to denial of service when processing a crafted shell command, due to missing validation after a \\x03 delimiter character. This may be used for DoS under very rare conditions of filtered command input.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1",
"2",
"3",
"4",
"5",
"7",
"6",
"8",
"9"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V2.0 or later version",
"product_ids": [
"1",
"2",
"3",
"4",
"5",
"7",
"6",
"8",
"9"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109815650/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.1,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"1",
"2",
"3",
"4",
"5",
"7",
"6",
"8",
"9"
]
}
],
"title": "CVE-2021-42376"
},
{
"cve": "CVE-2021-42377",
"cwe": {
"id": "CWE-763",
"name": "Release of Invalid Pointer or Reference"
},
"notes": [
{
"category": "summary",
"text": "An attacker-controlled pointer free in Busybox\u0027s hush applet leads to denial of service and possible code execution when processing a crafted shell command, due to the shell mishandling the \u0026\u0026\u0026 string. This may be used for remote code execution under rare conditions of filtered command input.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1",
"2",
"3",
"4",
"5",
"7",
"6",
"8",
"9"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V2.0 or later version",
"product_ids": [
"1",
"2",
"3",
"4",
"5",
"7",
"6",
"8",
"9"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109815650/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"1",
"2",
"3",
"4",
"5",
"7",
"6",
"8",
"9"
]
}
],
"title": "CVE-2021-42377"
},
{
"cve": "CVE-2021-42378",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"notes": [
{
"category": "summary",
"text": "A use-after-free in Busybox\u0027s awk applet leads to denial of service and possibly code execution when processing a crafted awk pattern in the getvar_i function.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1",
"2",
"3",
"4",
"5",
"7",
"6",
"8",
"9"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V2.0 or later version",
"product_ids": [
"1",
"2",
"3",
"4",
"5",
"7",
"6",
"8",
"9"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109815650/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.6,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"1",
"2",
"3",
"4",
"5",
"7",
"6",
"8",
"9"
]
}
],
"title": "CVE-2021-42378"
},
{
"cve": "CVE-2021-42379",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"notes": [
{
"category": "summary",
"text": "A use-after-free in Busybox\u0027s awk applet leads to denial of service and possibly code execution when processing a crafted awk pattern in the next_input_file function.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1",
"2",
"3",
"4",
"5",
"7",
"6",
"8",
"9"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V2.0 or later version",
"product_ids": [
"1",
"2",
"3",
"4",
"5",
"7",
"6",
"8",
"9"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109815650/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.6,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"1",
"2",
"3",
"4",
"5",
"7",
"6",
"8",
"9"
]
}
],
"title": "CVE-2021-42379"
},
{
"cve": "CVE-2021-42380",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"notes": [
{
"category": "summary",
"text": "A use-after-free in awk leads to denial of service and possibly code execution when processing a crafted awk pattern in the clrvar function.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1",
"2",
"3",
"4",
"5",
"7",
"6",
"8",
"9"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V2.0 or later version",
"product_ids": [
"1",
"2",
"3",
"4",
"5",
"7",
"6",
"8",
"9"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109815650/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.6,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"1",
"2",
"3",
"4",
"5",
"7",
"6",
"8",
"9"
]
}
],
"title": "CVE-2021-42380"
},
{
"cve": "CVE-2021-42381",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"notes": [
{
"category": "summary",
"text": "A use-after-free in awk leads to denial of service and possibly code execution when processing a crafted awk pattern in the hash_init function.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1",
"2",
"3",
"4",
"5",
"7",
"6",
"8",
"9"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V2.0 or later version",
"product_ids": [
"1",
"2",
"3",
"4",
"5",
"7",
"6",
"8",
"9"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109815650/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.6,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"1",
"2",
"3",
"4",
"5",
"7",
"6",
"8",
"9"
]
}
],
"title": "CVE-2021-42381"
},
{
"cve": "CVE-2021-42382",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"notes": [
{
"category": "summary",
"text": "A use-after-free in awk leads to denial of service and possibly code execution when processing a crafted awk pattern in the getvar_s function.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1",
"2",
"3",
"4",
"5",
"7",
"6",
"8",
"9"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V2.0 or later version",
"product_ids": [
"1",
"2",
"3",
"4",
"5",
"7",
"6",
"8",
"9"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109815650/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.6,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"1",
"2",
"3",
"4",
"5",
"7",
"6",
"8",
"9"
]
}
],
"title": "CVE-2021-42382"
},
{
"cve": "CVE-2021-42383",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"notes": [
{
"category": "summary",
"text": "A use-after-free in awk leads to denial of service and possibly code execution when processing a crafted awk pattern in the evaluate function.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1",
"2",
"3",
"4",
"5",
"7",
"6",
"8",
"9"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V2.0 or later version",
"product_ids": [
"1",
"2",
"3",
"4",
"5",
"7",
"6",
"8",
"9"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109815650/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.6,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"1",
"2",
"3",
"4",
"5",
"7",
"6",
"8",
"9"
]
}
],
"title": "CVE-2021-42383"
},
{
"cve": "CVE-2021-42384",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"notes": [
{
"category": "summary",
"text": "A use-after-free in Busybox\u0027s awk applet leads to denial of service and possibly code execution when processing a crafted awk pattern in the handle_special function.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1",
"2",
"3",
"4",
"5",
"7",
"6",
"8",
"9"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V2.0 or later version",
"product_ids": [
"1",
"2",
"3",
"4",
"5",
"7",
"6",
"8",
"9"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109815650/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.6,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"1",
"2",
"3",
"4",
"5",
"7",
"6",
"8",
"9"
]
}
],
"title": "CVE-2021-42384"
},
{
"cve": "CVE-2021-42385",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"notes": [
{
"category": "summary",
"text": "A use-after-free in awk leads to denial of service and possibly code execution when processing a crafted awk pattern in the evaluate function.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1",
"2",
"3",
"4",
"5",
"7",
"6",
"8",
"9"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V2.0 or later version",
"product_ids": [
"1",
"2",
"3",
"4",
"5",
"7",
"6",
"8",
"9"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109815650/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.6,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"1",
"2",
"3",
"4",
"5",
"7",
"6",
"8",
"9"
]
}
],
"title": "CVE-2021-42385"
},
{
"cve": "CVE-2021-42386",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"notes": [
{
"category": "summary",
"text": "A use-after-free in awk leads to denial of service and possibly code execution when processing a crafted awk pattern in the nvalloc function.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1",
"2",
"3",
"4",
"5",
"7",
"6",
"8",
"9"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V2.0 or later version",
"product_ids": [
"1",
"2",
"3",
"4",
"5",
"7",
"6",
"8",
"9"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109815650/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.6,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"1",
"2",
"3",
"4",
"5",
"7",
"6",
"8",
"9"
]
}
],
"title": "CVE-2021-42386"
},
{
"cve": "CVE-2022-23395",
"cwe": {
"id": "CWE-1321",
"name": "Improperly Controlled Modification of Object Prototype Attributes (\u0027Prototype Pollution\u0027)"
},
"notes": [
{
"category": "summary",
"text": "jQuery Cookie 1.4.1 is affected by prototype pollution, which can lead to DOM cross-site scripting (XSS).",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1",
"2",
"3",
"4",
"5",
"7",
"6",
"8",
"9"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V2.0 or later version",
"product_ids": [
"1",
"2",
"3",
"4",
"5",
"7",
"6",
"8",
"9"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109815650/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"1",
"2",
"3",
"4",
"5",
"7",
"6",
"8",
"9"
]
}
],
"title": "CVE-2022-23395"
}
]
}
FKIE_CVE-2021-42384
Vulnerability from fkie_nvd - Published: 2021-11-15 21:15 - Updated: 2025-11-03 21:157.2 (High) - CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
| URL | Tags | ||
|---|---|---|---|
| reefs@jfrog.com | https://claroty.com/team82/research/unboxing-busybox-14-vulnerabilities-uncovered-by-claroty-jfrog | ||
| reefs@jfrog.com | https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/ | Third Party Advisory | |
| reefs@jfrog.com | https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/ | ||
| reefs@jfrog.com | https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/ | ||
| reefs@jfrog.com | https://security.netapp.com/advisory/ntap-20211223-0002/ | Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | https://claroty.com/team82/research/unboxing-busybox-14-vulnerabilities-uncovered-by-claroty-jfrog | ||
| af854a3a-2127-422b-91ae-364da2661108 | https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/ | Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | https://lists.debian.org/debian-lts-announce/2025/01/msg00012.html | ||
| af854a3a-2127-422b-91ae-364da2661108 | https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/ | ||
| af854a3a-2127-422b-91ae-364da2661108 | https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/ | ||
| af854a3a-2127-422b-91ae-364da2661108 | https://security.netapp.com/advisory/ntap-20211223-0002/ | Third Party Advisory |
| Vendor | Product | Version | |
|---|---|---|---|
| busybox | busybox | * | |
| fedoraproject | fedora | 33 | |
| fedoraproject | fedora | 34 |
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:busybox:busybox:*:*:*:*:*:*:*:*",
"matchCriteriaId": "6BB249A2-48D9-4FA1-B344-1E3595A8FFB6",
"versionEndIncluding": "1.33.1",
"versionStartIncluding": "1.18.0",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:fedoraproject:fedora:33:*:*:*:*:*:*:*",
"matchCriteriaId": "E460AA51-FCDA-46B9-AE97-E6676AA5E194",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:fedoraproject:fedora:34:*:*:*:*:*:*:*",
"matchCriteriaId": "A930E247-0B43-43CB-98FF-6CE7B8189835",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A use-after-free in Busybox\u0027s awk applet leads to denial of service and possibly code execution when processing a crafted awk pattern in the handle_special function"
},
{
"lang": "es",
"value": "Un uso de memoria previamente liberada en el applet awk de Busybox conduce a la denegaci\u00f3n de servicio y posiblemente a una ejecuci\u00f3n de c\u00f3digo cuando es procesado un patr\u00f3n awk dise\u00f1ado en la funci\u00f3n handle_special"
}
],
"id": "CVE-2021-42384",
"lastModified": "2025-11-03T21:15:46.123",
"metrics": {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "SINGLE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.5,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P",
"version": "2.0"
},
"exploitabilityScore": 8.0,
"impactScore": 6.4,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": false
}
],
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.2,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 1.2,
"impactScore": 5.9,
"source": "nvd@nist.gov",
"type": "Primary"
},
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.2,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 1.2,
"impactScore": 5.9,
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary"
}
]
},
"published": "2021-11-15T21:15:08.070",
"references": [
{
"source": "reefs@jfrog.com",
"url": "https://claroty.com/team82/research/unboxing-busybox-14-vulnerabilities-uncovered-by-claroty-jfrog"
},
{
"source": "reefs@jfrog.com",
"tags": [
"Third Party Advisory"
],
"url": "https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/"
},
{
"source": "reefs@jfrog.com",
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/"
},
{
"source": "reefs@jfrog.com",
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/"
},
{
"source": "reefs@jfrog.com",
"tags": [
"Third Party Advisory"
],
"url": "https://security.netapp.com/advisory/ntap-20211223-0002/"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://claroty.com/team82/research/unboxing-busybox-14-vulnerabilities-uncovered-by-claroty-jfrog"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://lists.debian.org/debian-lts-announce/2025/01/msg00012.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "https://security.netapp.com/advisory/ntap-20211223-0002/"
}
],
"sourceIdentifier": "reefs@jfrog.com",
"vulnStatus": "Modified",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-416"
}
],
"source": "reefs@jfrog.com",
"type": "Secondary"
},
{
"description": [
{
"lang": "en",
"value": "CWE-416"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
WID-SEC-W-2023-1432
Vulnerability from csaf_certbund - Published: 2023-06-12 22:00 - Updated: 2023-06-22 22:00Notes
{
"document": {
"aggregate_severity": {
"text": "kritisch"
},
"category": "csaf_base",
"csaf_version": "2.0",
"distribution": {
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "de-DE",
"notes": [
{
"category": "legal_disclaimer",
"text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen."
},
{
"category": "description",
"text": "Die SIMATIC S7 ist eine Serie von SPS (Speicherprogrammierbare Steuerungen) f\u00fcr Automatisierungsanwendungen.",
"title": "Produktbeschreibung"
},
{
"category": "summary",
"text": "Ein Angreifer aus dem angrenzenden Netzwerk oder ein entfernter, anonymer, authentisierter, physischer oder lokaler Angreifer kann mehrere Schwachstellen in Siemens SIMATIC S7 ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien zu erweitern und Daten zu manipulieren.",
"title": "Angriff"
},
{
"category": "general",
"text": "- BIOS/Firmware",
"title": "Betroffene Betriebssysteme"
}
],
"publisher": {
"category": "other",
"contact_details": "csaf-provider@cert-bund.de",
"name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik",
"namespace": "https://www.bsi.bund.de"
},
"references": [
{
"category": "self",
"summary": "WID-SEC-W-2023-1432 - CSAF Version",
"url": "https://wid.cert-bund.de/.well-known/csaf/white/2023/wid-sec-w-2023-1432.json"
},
{
"category": "self",
"summary": "WID-SEC-2023-1432 - Portal Version",
"url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2023-1432"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-6187-1 vom 2023-06-22",
"url": "https://ubuntu.com/security/notices/USN-6187-1"
},
{
"category": "external",
"summary": "Siemens Security Advisory vom 2023-06-12",
"url": "https://cert-portal.siemens.com/productcert/html/ssa-831302.html"
},
{
"category": "external",
"summary": "Siemens Security Advisory vom 2023-06-12",
"url": "https://cert-portal.siemens.com/productcert/html/ssa-794697.html"
}
],
"source_lang": "en-US",
"title": "Siemens SIMATIC S7: Mehrere Schwachstellen",
"tracking": {
"current_release_date": "2023-06-22T22:00:00.000+00:00",
"generator": {
"date": "2024-08-15T17:52:18.956+00:00",
"engine": {
"name": "BSI-WID",
"version": "1.3.5"
}
},
"id": "WID-SEC-W-2023-1432",
"initial_release_date": "2023-06-12T22:00:00.000+00:00",
"revision_history": [
{
"date": "2023-06-12T22:00:00.000+00:00",
"number": "1",
"summary": "Initiale Fassung"
},
{
"date": "2023-06-22T22:00:00.000+00:00",
"number": "2",
"summary": "Neue Updates von Ubuntu aufgenommen"
}
],
"status": "final",
"version": "2"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Siemens SIMATIC S7 1500 TM MFP",
"product": {
"name": "Siemens SIMATIC S7 1500 TM MFP",
"product_id": "T028071",
"product_identification_helper": {
"cpe": "cpe:/h:siemens:simatic_s7:1500_tm_mfp"
}
}
}
],
"category": "vendor",
"name": "Siemens"
},
{
"branches": [
{
"category": "product_name",
"name": "Ubuntu Linux",
"product": {
"name": "Ubuntu Linux",
"product_id": "T000126",
"product_identification_helper": {
"cpe": "cpe:/o:canonical:ubuntu_linux:-"
}
}
}
],
"category": "vendor",
"name": "Ubuntu"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2023-26607",
"notes": [
{
"category": "description",
"text": "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzul\u00e4ssigen Einschr\u00e4nkungen, Puffer\u00fcberl\u00e4ufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien."
}
],
"product_status": {
"known_affected": [
"T000126",
"T028071"
]
},
"release_date": "2023-06-12T22:00:00.000+00:00",
"title": "CVE-2023-26607"
},
{
"cve": "CVE-2023-23559",
"notes": [
{
"category": "description",
"text": "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzul\u00e4ssigen Einschr\u00e4nkungen, Puffer\u00fcberl\u00e4ufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien."
}
],
"product_status": {
"known_affected": [
"T000126",
"T028071"
]
},
"release_date": "2023-06-12T22:00:00.000+00:00",
"title": "CVE-2023-23559"
},
{
"cve": "CVE-2023-23455",
"notes": [
{
"category": "description",
"text": "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzul\u00e4ssigen Einschr\u00e4nkungen, Puffer\u00fcberl\u00e4ufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien."
}
],
"product_status": {
"known_affected": [
"T000126",
"T028071"
]
},
"release_date": "2023-06-12T22:00:00.000+00:00",
"title": "CVE-2023-23455"
},
{
"cve": "CVE-2023-23454",
"notes": [
{
"category": "description",
"text": "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzul\u00e4ssigen Einschr\u00e4nkungen, Puffer\u00fcberl\u00e4ufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien."
}
],
"product_status": {
"known_affected": [
"T000126",
"T028071"
]
},
"release_date": "2023-06-12T22:00:00.000+00:00",
"title": "CVE-2023-23454"
},
{
"cve": "CVE-2023-1095",
"notes": [
{
"category": "description",
"text": "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzul\u00e4ssigen Einschr\u00e4nkungen, Puffer\u00fcberl\u00e4ufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien."
}
],
"product_status": {
"known_affected": [
"T000126",
"T028071"
]
},
"release_date": "2023-06-12T22:00:00.000+00:00",
"title": "CVE-2023-1095"
},
{
"cve": "CVE-2023-1077",
"notes": [
{
"category": "description",
"text": "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzul\u00e4ssigen Einschr\u00e4nkungen, Puffer\u00fcberl\u00e4ufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien."
}
],
"product_status": {
"known_affected": [
"T000126",
"T028071"
]
},
"release_date": "2023-06-12T22:00:00.000+00:00",
"title": "CVE-2023-1077"
},
{
"cve": "CVE-2023-1073",
"notes": [
{
"category": "description",
"text": "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzul\u00e4ssigen Einschr\u00e4nkungen, Puffer\u00fcberl\u00e4ufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien."
}
],
"product_status": {
"known_affected": [
"T000126",
"T028071"
]
},
"release_date": "2023-06-12T22:00:00.000+00:00",
"title": "CVE-2023-1073"
},
{
"cve": "CVE-2023-0590",
"notes": [
{
"category": "description",
"text": "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzul\u00e4ssigen Einschr\u00e4nkungen, Puffer\u00fcberl\u00e4ufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien."
}
],
"product_status": {
"known_affected": [
"T000126",
"T028071"
]
},
"release_date": "2023-06-12T22:00:00.000+00:00",
"title": "CVE-2023-0590"
},
{
"cve": "CVE-2023-0466",
"notes": [
{
"category": "description",
"text": "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzul\u00e4ssigen Einschr\u00e4nkungen, Puffer\u00fcberl\u00e4ufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien."
}
],
"product_status": {
"known_affected": [
"T000126",
"T028071"
]
},
"release_date": "2023-06-12T22:00:00.000+00:00",
"title": "CVE-2023-0466"
},
{
"cve": "CVE-2023-0465",
"notes": [
{
"category": "description",
"text": "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzul\u00e4ssigen Einschr\u00e4nkungen, Puffer\u00fcberl\u00e4ufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien."
}
],
"product_status": {
"known_affected": [
"T000126",
"T028071"
]
},
"release_date": "2023-06-12T22:00:00.000+00:00",
"title": "CVE-2023-0465"
},
{
"cve": "CVE-2023-0464",
"notes": [
{
"category": "description",
"text": "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzul\u00e4ssigen Einschr\u00e4nkungen, Puffer\u00fcberl\u00e4ufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien."
}
],
"product_status": {
"known_affected": [
"T000126",
"T028071"
]
},
"release_date": "2023-06-12T22:00:00.000+00:00",
"title": "CVE-2023-0464"
},
{
"cve": "CVE-2023-0394",
"notes": [
{
"category": "description",
"text": "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzul\u00e4ssigen Einschr\u00e4nkungen, Puffer\u00fcberl\u00e4ufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien."
}
],
"product_status": {
"known_affected": [
"T000126",
"T028071"
]
},
"release_date": "2023-06-12T22:00:00.000+00:00",
"title": "CVE-2023-0394"
},
{
"cve": "CVE-2023-0286",
"notes": [
{
"category": "description",
"text": "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzul\u00e4ssigen Einschr\u00e4nkungen, Puffer\u00fcberl\u00e4ufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien."
}
],
"product_status": {
"known_affected": [
"T000126",
"T028071"
]
},
"release_date": "2023-06-12T22:00:00.000+00:00",
"title": "CVE-2023-0286"
},
{
"cve": "CVE-2023-0215",
"notes": [
{
"category": "description",
"text": "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzul\u00e4ssigen Einschr\u00e4nkungen, Puffer\u00fcberl\u00e4ufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien."
}
],
"product_status": {
"known_affected": [
"T000126",
"T028071"
]
},
"release_date": "2023-06-12T22:00:00.000+00:00",
"title": "CVE-2023-0215"
},
{
"cve": "CVE-2023-0179",
"notes": [
{
"category": "description",
"text": "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzul\u00e4ssigen Einschr\u00e4nkungen, Puffer\u00fcberl\u00e4ufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien."
}
],
"product_status": {
"known_affected": [
"T000126",
"T028071"
]
},
"release_date": "2023-06-12T22:00:00.000+00:00",
"title": "CVE-2023-0179"
},
{
"cve": "CVE-2022-47946",
"notes": [
{
"category": "description",
"text": "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzul\u00e4ssigen Einschr\u00e4nkungen, Puffer\u00fcberl\u00e4ufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien."
}
],
"product_status": {
"known_affected": [
"T000126",
"T028071"
]
},
"release_date": "2023-06-12T22:00:00.000+00:00",
"title": "CVE-2022-47946"
},
{
"cve": "CVE-2022-47929",
"notes": [
{
"category": "description",
"text": "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzul\u00e4ssigen Einschr\u00e4nkungen, Puffer\u00fcberl\u00e4ufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien."
}
],
"product_status": {
"known_affected": [
"T000126",
"T028071"
]
},
"release_date": "2023-06-12T22:00:00.000+00:00",
"title": "CVE-2022-47929"
},
{
"cve": "CVE-2022-47520",
"notes": [
{
"category": "description",
"text": "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzul\u00e4ssigen Einschr\u00e4nkungen, Puffer\u00fcberl\u00e4ufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien."
}
],
"product_status": {
"known_affected": [
"T000126",
"T028071"
]
},
"release_date": "2023-06-12T22:00:00.000+00:00",
"title": "CVE-2022-47520"
},
{
"cve": "CVE-2022-47518",
"notes": [
{
"category": "description",
"text": "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzul\u00e4ssigen Einschr\u00e4nkungen, Puffer\u00fcberl\u00e4ufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien."
}
],
"product_status": {
"known_affected": [
"T000126",
"T028071"
]
},
"release_date": "2023-06-12T22:00:00.000+00:00",
"title": "CVE-2022-47518"
},
{
"cve": "CVE-2022-4662",
"notes": [
{
"category": "description",
"text": "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzul\u00e4ssigen Einschr\u00e4nkungen, Puffer\u00fcberl\u00e4ufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien."
}
],
"product_status": {
"known_affected": [
"T000126",
"T028071"
]
},
"release_date": "2023-06-12T22:00:00.000+00:00",
"title": "CVE-2022-4662"
},
{
"cve": "CVE-2022-4450",
"notes": [
{
"category": "description",
"text": "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzul\u00e4ssigen Einschr\u00e4nkungen, Puffer\u00fcberl\u00e4ufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien."
}
],
"product_status": {
"known_affected": [
"T000126",
"T028071"
]
},
"release_date": "2023-06-12T22:00:00.000+00:00",
"title": "CVE-2022-4450"
},
{
"cve": "CVE-2022-4378",
"notes": [
{
"category": "description",
"text": "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzul\u00e4ssigen Einschr\u00e4nkungen, Puffer\u00fcberl\u00e4ufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien."
}
],
"product_status": {
"known_affected": [
"T000126",
"T028071"
]
},
"release_date": "2023-06-12T22:00:00.000+00:00",
"title": "CVE-2022-4378"
},
{
"cve": "CVE-2022-43750",
"notes": [
{
"category": "description",
"text": "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzul\u00e4ssigen Einschr\u00e4nkungen, Puffer\u00fcberl\u00e4ufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien."
}
],
"product_status": {
"known_affected": [
"T000126",
"T028071"
]
},
"release_date": "2023-06-12T22:00:00.000+00:00",
"title": "CVE-2022-43750"
},
{
"cve": "CVE-2022-4304",
"notes": [
{
"category": "description",
"text": "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzul\u00e4ssigen Einschr\u00e4nkungen, Puffer\u00fcberl\u00e4ufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien."
}
],
"product_status": {
"known_affected": [
"T000126",
"T028071"
]
},
"release_date": "2023-06-12T22:00:00.000+00:00",
"title": "CVE-2022-4304"
},
{
"cve": "CVE-2022-42896",
"notes": [
{
"category": "description",
"text": "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzul\u00e4ssigen Einschr\u00e4nkungen, Puffer\u00fcberl\u00e4ufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien."
}
],
"product_status": {
"known_affected": [
"T000126",
"T028071"
]
},
"release_date": "2023-06-12T22:00:00.000+00:00",
"title": "CVE-2022-42896"
},
{
"cve": "CVE-2022-42895",
"notes": [
{
"category": "description",
"text": "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzul\u00e4ssigen Einschr\u00e4nkungen, Puffer\u00fcberl\u00e4ufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien."
}
],
"product_status": {
"known_affected": [
"T000126",
"T028071"
]
},
"release_date": "2023-06-12T22:00:00.000+00:00",
"title": "CVE-2022-42895"
},
{
"cve": "CVE-2022-42722",
"notes": [
{
"category": "description",
"text": "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzul\u00e4ssigen Einschr\u00e4nkungen, Puffer\u00fcberl\u00e4ufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien."
}
],
"product_status": {
"known_affected": [
"T000126",
"T028071"
]
},
"release_date": "2023-06-12T22:00:00.000+00:00",
"title": "CVE-2022-42722"
},
{
"cve": "CVE-2022-42721",
"notes": [
{
"category": "description",
"text": "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzul\u00e4ssigen Einschr\u00e4nkungen, Puffer\u00fcberl\u00e4ufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien."
}
],
"product_status": {
"known_affected": [
"T000126",
"T028071"
]
},
"release_date": "2023-06-12T22:00:00.000+00:00",
"title": "CVE-2022-42721"
},
{
"cve": "CVE-2022-42720",
"notes": [
{
"category": "description",
"text": "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzul\u00e4ssigen Einschr\u00e4nkungen, Puffer\u00fcberl\u00e4ufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien."
}
],
"product_status": {
"known_affected": [
"T000126",
"T028071"
]
},
"release_date": "2023-06-12T22:00:00.000+00:00",
"title": "CVE-2022-42720"
},
{
"cve": "CVE-2022-42719",
"notes": [
{
"category": "description",
"text": "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzul\u00e4ssigen Einschr\u00e4nkungen, Puffer\u00fcberl\u00e4ufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien."
}
],
"product_status": {
"known_affected": [
"T000126",
"T028071"
]
},
"release_date": "2023-06-12T22:00:00.000+00:00",
"title": "CVE-2022-42719"
},
{
"cve": "CVE-2022-42703",
"notes": [
{
"category": "description",
"text": "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzul\u00e4ssigen Einschr\u00e4nkungen, Puffer\u00fcberl\u00e4ufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien."
}
],
"product_status": {
"known_affected": [
"T000126",
"T028071"
]
},
"release_date": "2023-06-12T22:00:00.000+00:00",
"title": "CVE-2022-42703"
},
{
"cve": "CVE-2022-42432",
"notes": [
{
"category": "description",
"text": "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzul\u00e4ssigen Einschr\u00e4nkungen, Puffer\u00fcberl\u00e4ufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien."
}
],
"product_status": {
"known_affected": [
"T000126",
"T028071"
]
},
"release_date": "2023-06-12T22:00:00.000+00:00",
"title": "CVE-2022-42432"
},
{
"cve": "CVE-2022-42329",
"notes": [
{
"category": "description",
"text": "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzul\u00e4ssigen Einschr\u00e4nkungen, Puffer\u00fcberl\u00e4ufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien."
}
],
"product_status": {
"known_affected": [
"T000126",
"T028071"
]
},
"release_date": "2023-06-12T22:00:00.000+00:00",
"title": "CVE-2022-42329"
},
{
"cve": "CVE-2022-42328",
"notes": [
{
"category": "description",
"text": "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzul\u00e4ssigen Einschr\u00e4nkungen, Puffer\u00fcberl\u00e4ufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien."
}
],
"product_status": {
"known_affected": [
"T000126",
"T028071"
]
},
"release_date": "2023-06-12T22:00:00.000+00:00",
"title": "CVE-2022-42328"
},
{
"cve": "CVE-2022-41850",
"notes": [
{
"category": "description",
"text": "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzul\u00e4ssigen Einschr\u00e4nkungen, Puffer\u00fcberl\u00e4ufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien."
}
],
"product_status": {
"known_affected": [
"T000126",
"T028071"
]
},
"release_date": "2023-06-12T22:00:00.000+00:00",
"title": "CVE-2022-41850"
},
{
"cve": "CVE-2022-41849",
"notes": [
{
"category": "description",
"text": "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzul\u00e4ssigen Einschr\u00e4nkungen, Puffer\u00fcberl\u00e4ufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien."
}
],
"product_status": {
"known_affected": [
"T000126",
"T028071"
]
},
"release_date": "2023-06-12T22:00:00.000+00:00",
"title": "CVE-2022-41849"
},
{
"cve": "CVE-2022-41674",
"notes": [
{
"category": "description",
"text": "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzul\u00e4ssigen Einschr\u00e4nkungen, Puffer\u00fcberl\u00e4ufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien."
}
],
"product_status": {
"known_affected": [
"T000126",
"T028071"
]
},
"release_date": "2023-06-12T22:00:00.000+00:00",
"title": "CVE-2022-41674"
},
{
"cve": "CVE-2022-4139",
"notes": [
{
"category": "description",
"text": "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzul\u00e4ssigen Einschr\u00e4nkungen, Puffer\u00fcberl\u00e4ufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien."
}
],
"product_status": {
"known_affected": [
"T000126",
"T028071"
]
},
"release_date": "2023-06-12T22:00:00.000+00:00",
"title": "CVE-2022-4139"
},
{
"cve": "CVE-2022-4129",
"notes": [
{
"category": "description",
"text": "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzul\u00e4ssigen Einschr\u00e4nkungen, Puffer\u00fcberl\u00e4ufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien."
}
],
"product_status": {
"known_affected": [
"T000126",
"T028071"
]
},
"release_date": "2023-06-12T22:00:00.000+00:00",
"title": "CVE-2022-4129"
},
{
"cve": "CVE-2022-41222",
"notes": [
{
"category": "description",
"text": "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzul\u00e4ssigen Einschr\u00e4nkungen, Puffer\u00fcberl\u00e4ufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien."
}
],
"product_status": {
"known_affected": [
"T000126",
"T028071"
]
},
"release_date": "2023-06-12T22:00:00.000+00:00",
"title": "CVE-2022-41222"
},
{
"cve": "CVE-2022-41218",
"notes": [
{
"category": "description",
"text": "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzul\u00e4ssigen Einschr\u00e4nkungen, Puffer\u00fcberl\u00e4ufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien."
}
],
"product_status": {
"known_affected": [
"T000126",
"T028071"
]
},
"release_date": "2023-06-12T22:00:00.000+00:00",
"title": "CVE-2022-41218"
},
{
"cve": "CVE-2022-4095",
"notes": [
{
"category": "description",
"text": "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzul\u00e4ssigen Einschr\u00e4nkungen, Puffer\u00fcberl\u00e4ufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien."
}
],
"product_status": {
"known_affected": [
"T000126",
"T028071"
]
},
"release_date": "2023-06-12T22:00:00.000+00:00",
"title": "CVE-2022-4095"
},
{
"cve": "CVE-2022-40768",
"notes": [
{
"category": "description",
"text": "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzul\u00e4ssigen Einschr\u00e4nkungen, Puffer\u00fcberl\u00e4ufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien."
}
],
"product_status": {
"known_affected": [
"T000126",
"T028071"
]
},
"release_date": "2023-06-12T22:00:00.000+00:00",
"title": "CVE-2022-40768"
},
{
"cve": "CVE-2022-40307",
"notes": [
{
"category": "description",
"text": "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzul\u00e4ssigen Einschr\u00e4nkungen, Puffer\u00fcberl\u00e4ufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien."
}
],
"product_status": {
"known_affected": [
"T000126",
"T028071"
]
},
"release_date": "2023-06-12T22:00:00.000+00:00",
"title": "CVE-2022-40307"
},
{
"cve": "CVE-2022-39190",
"notes": [
{
"category": "description",
"text": "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzul\u00e4ssigen Einschr\u00e4nkungen, Puffer\u00fcberl\u00e4ufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien."
}
],
"product_status": {
"known_affected": [
"T000126",
"T028071"
]
},
"release_date": "2023-06-12T22:00:00.000+00:00",
"title": "CVE-2022-39190"
},
{
"cve": "CVE-2022-39188",
"notes": [
{
"category": "description",
"text": "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzul\u00e4ssigen Einschr\u00e4nkungen, Puffer\u00fcberl\u00e4ufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien."
}
],
"product_status": {
"known_affected": [
"T000126",
"T028071"
]
},
"release_date": "2023-06-12T22:00:00.000+00:00",
"title": "CVE-2022-39188"
},
{
"cve": "CVE-2022-36946",
"notes": [
{
"category": "description",
"text": "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzul\u00e4ssigen Einschr\u00e4nkungen, Puffer\u00fcberl\u00e4ufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien."
}
],
"product_status": {
"known_affected": [
"T000126",
"T028071"
]
},
"release_date": "2023-06-12T22:00:00.000+00:00",
"title": "CVE-2022-36946"
},
{
"cve": "CVE-2022-36879",
"notes": [
{
"category": "description",
"text": "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzul\u00e4ssigen Einschr\u00e4nkungen, Puffer\u00fcberl\u00e4ufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien."
}
],
"product_status": {
"known_affected": [
"T000126",
"T028071"
]
},
"release_date": "2023-06-12T22:00:00.000+00:00",
"title": "CVE-2022-36879"
},
{
"cve": "CVE-2022-3649",
"notes": [
{
"category": "description",
"text": "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzul\u00e4ssigen Einschr\u00e4nkungen, Puffer\u00fcberl\u00e4ufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien."
}
],
"product_status": {
"known_affected": [
"T000126",
"T028071"
]
},
"release_date": "2023-06-12T22:00:00.000+00:00",
"title": "CVE-2022-3649"
},
{
"cve": "CVE-2022-3646",
"notes": [
{
"category": "description",
"text": "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzul\u00e4ssigen Einschr\u00e4nkungen, Puffer\u00fcberl\u00e4ufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien."
}
],
"product_status": {
"known_affected": [
"T000126",
"T028071"
]
},
"release_date": "2023-06-12T22:00:00.000+00:00",
"title": "CVE-2022-3646"
},
{
"cve": "CVE-2022-3635",
"notes": [
{
"category": "description",
"text": "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzul\u00e4ssigen Einschr\u00e4nkungen, Puffer\u00fcberl\u00e4ufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien."
}
],
"product_status": {
"known_affected": [
"T000126",
"T028071"
]
},
"release_date": "2023-06-12T22:00:00.000+00:00",
"title": "CVE-2022-3635"
},
{
"cve": "CVE-2022-3633",
"notes": [
{
"category": "description",
"text": "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzul\u00e4ssigen Einschr\u00e4nkungen, Puffer\u00fcberl\u00e4ufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien."
}
],
"product_status": {
"known_affected": [
"T000126",
"T028071"
]
},
"release_date": "2023-06-12T22:00:00.000+00:00",
"title": "CVE-2022-3633"
},
{
"cve": "CVE-2022-3629",
"notes": [
{
"category": "description",
"text": "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzul\u00e4ssigen Einschr\u00e4nkungen, Puffer\u00fcberl\u00e4ufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien."
}
],
"product_status": {
"known_affected": [
"T000126",
"T028071"
]
},
"release_date": "2023-06-12T22:00:00.000+00:00",
"title": "CVE-2022-3629"
},
{
"cve": "CVE-2022-36280",
"notes": [
{
"category": "description",
"text": "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzul\u00e4ssigen Einschr\u00e4nkungen, Puffer\u00fcberl\u00e4ufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien."
}
],
"product_status": {
"known_affected": [
"T000126",
"T028071"
]
},
"release_date": "2023-06-12T22:00:00.000+00:00",
"title": "CVE-2022-36280"
},
{
"cve": "CVE-2022-3628",
"notes": [
{
"category": "description",
"text": "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzul\u00e4ssigen Einschr\u00e4nkungen, Puffer\u00fcberl\u00e4ufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien."
}
],
"product_status": {
"known_affected": [
"T000126",
"T028071"
]
},
"release_date": "2023-06-12T22:00:00.000+00:00",
"title": "CVE-2022-3628"
},
{
"cve": "CVE-2022-3625",
"notes": [
{
"category": "description",
"text": "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzul\u00e4ssigen Einschr\u00e4nkungen, Puffer\u00fcberl\u00e4ufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien."
}
],
"product_status": {
"known_affected": [
"T000126",
"T028071"
]
},
"release_date": "2023-06-12T22:00:00.000+00:00",
"title": "CVE-2022-3625"
},
{
"cve": "CVE-2022-3621",
"notes": [
{
"category": "description",
"text": "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzul\u00e4ssigen Einschr\u00e4nkungen, Puffer\u00fcberl\u00e4ufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien."
}
],
"product_status": {
"known_affected": [
"T000126",
"T028071"
]
},
"release_date": "2023-06-12T22:00:00.000+00:00",
"title": "CVE-2022-3621"
},
{
"cve": "CVE-2022-36123",
"notes": [
{
"category": "description",
"text": "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzul\u00e4ssigen Einschr\u00e4nkungen, Puffer\u00fcberl\u00e4ufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien."
}
],
"product_status": {
"known_affected": [
"T000126",
"T028071"
]
},
"release_date": "2023-06-12T22:00:00.000+00:00",
"title": "CVE-2022-36123"
},
{
"cve": "CVE-2022-3606",
"notes": [
{
"category": "description",
"text": "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzul\u00e4ssigen Einschr\u00e4nkungen, Puffer\u00fcberl\u00e4ufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien."
}
],
"product_status": {
"known_affected": [
"T000126",
"T028071"
]
},
"release_date": "2023-06-12T22:00:00.000+00:00",
"title": "CVE-2022-3606"
},
{
"cve": "CVE-2022-3594",
"notes": [
{
"category": "description",
"text": "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzul\u00e4ssigen Einschr\u00e4nkungen, Puffer\u00fcberl\u00e4ufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien."
}
],
"product_status": {
"known_affected": [
"T000126",
"T028071"
]
},
"release_date": "2023-06-12T22:00:00.000+00:00",
"title": "CVE-2022-3594"
},
{
"cve": "CVE-2022-3586",
"notes": [
{
"category": "description",
"text": "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzul\u00e4ssigen Einschr\u00e4nkungen, Puffer\u00fcberl\u00e4ufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien."
}
],
"product_status": {
"known_affected": [
"T000126",
"T028071"
]
},
"release_date": "2023-06-12T22:00:00.000+00:00",
"title": "CVE-2022-3586"
},
{
"cve": "CVE-2022-3565",
"notes": [
{
"category": "description",
"text": "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzul\u00e4ssigen Einschr\u00e4nkungen, Puffer\u00fcberl\u00e4ufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien."
}
],
"product_status": {
"known_affected": [
"T000126",
"T028071"
]
},
"release_date": "2023-06-12T22:00:00.000+00:00",
"title": "CVE-2022-3565"
},
{
"cve": "CVE-2022-3564",
"notes": [
{
"category": "description",
"text": "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzul\u00e4ssigen Einschr\u00e4nkungen, Puffer\u00fcberl\u00e4ufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien."
}
],
"product_status": {
"known_affected": [
"T000126",
"T028071"
]
},
"release_date": "2023-06-12T22:00:00.000+00:00",
"title": "CVE-2022-3564"
},
{
"cve": "CVE-2022-3545",
"notes": [
{
"category": "description",
"text": "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzul\u00e4ssigen Einschr\u00e4nkungen, Puffer\u00fcberl\u00e4ufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien."
}
],
"product_status": {
"known_affected": [
"T000126",
"T028071"
]
},
"release_date": "2023-06-12T22:00:00.000+00:00",
"title": "CVE-2022-3545"
},
{
"cve": "CVE-2022-3534",
"notes": [
{
"category": "description",
"text": "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzul\u00e4ssigen Einschr\u00e4nkungen, Puffer\u00fcberl\u00e4ufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien."
}
],
"product_status": {
"known_affected": [
"T000126",
"T028071"
]
},
"release_date": "2023-06-12T22:00:00.000+00:00",
"title": "CVE-2022-3534"
},
{
"cve": "CVE-2022-3524",
"notes": [
{
"category": "description",
"text": "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzul\u00e4ssigen Einschr\u00e4nkungen, Puffer\u00fcberl\u00e4ufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien."
}
],
"product_status": {
"known_affected": [
"T000126",
"T028071"
]
},
"release_date": "2023-06-12T22:00:00.000+00:00",
"title": "CVE-2022-3524"
},
{
"cve": "CVE-2022-3521",
"notes": [
{
"category": "description",
"text": "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzul\u00e4ssigen Einschr\u00e4nkungen, Puffer\u00fcberl\u00e4ufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien."
}
],
"product_status": {
"known_affected": [
"T000126",
"T028071"
]
},
"release_date": "2023-06-12T22:00:00.000+00:00",
"title": "CVE-2022-3521"
},
{
"cve": "CVE-2022-34918",
"notes": [
{
"category": "description",
"text": "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzul\u00e4ssigen Einschr\u00e4nkungen, Puffer\u00fcberl\u00e4ufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien."
}
],
"product_status": {
"known_affected": [
"T000126",
"T028071"
]
},
"release_date": "2023-06-12T22:00:00.000+00:00",
"title": "CVE-2022-34918"
},
{
"cve": "CVE-2022-3435",
"notes": [
{
"category": "description",
"text": "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzul\u00e4ssigen Einschr\u00e4nkungen, Puffer\u00fcberl\u00e4ufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien."
}
],
"product_status": {
"known_affected": [
"T000126",
"T028071"
]
},
"release_date": "2023-06-12T22:00:00.000+00:00",
"title": "CVE-2022-3435"
},
{
"cve": "CVE-2022-3303",
"notes": [
{
"category": "description",
"text": "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzul\u00e4ssigen Einschr\u00e4nkungen, Puffer\u00fcberl\u00e4ufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien."
}
],
"product_status": {
"known_affected": [
"T000126",
"T028071"
]
},
"release_date": "2023-06-12T22:00:00.000+00:00",
"title": "CVE-2022-3303"
},
{
"cve": "CVE-2022-32296",
"notes": [
{
"category": "description",
"text": "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzul\u00e4ssigen Einschr\u00e4nkungen, Puffer\u00fcberl\u00e4ufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien."
}
],
"product_status": {
"known_affected": [
"T000126",
"T028071"
]
},
"release_date": "2023-06-12T22:00:00.000+00:00",
"title": "CVE-2022-32296"
},
{
"cve": "CVE-2022-32250",
"notes": [
{
"category": "description",
"text": "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzul\u00e4ssigen Einschr\u00e4nkungen, Puffer\u00fcberl\u00e4ufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien."
}
],
"product_status": {
"known_affected": [
"T000126",
"T028071"
]
},
"release_date": "2023-06-12T22:00:00.000+00:00",
"title": "CVE-2022-32250"
},
{
"cve": "CVE-2022-3169",
"notes": [
{
"category": "description",
"text": "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzul\u00e4ssigen Einschr\u00e4nkungen, Puffer\u00fcberl\u00e4ufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien."
}
],
"product_status": {
"known_affected": [
"T000126",
"T028071"
]
},
"release_date": "2023-06-12T22:00:00.000+00:00",
"title": "CVE-2022-3169"
},
{
"cve": "CVE-2022-3115",
"notes": [
{
"category": "description",
"text": "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzul\u00e4ssigen Einschr\u00e4nkungen, Puffer\u00fcberl\u00e4ufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien."
}
],
"product_status": {
"known_affected": [
"T000126",
"T028071"
]
},
"release_date": "2023-06-12T22:00:00.000+00:00",
"title": "CVE-2022-3115"
},
{
"cve": "CVE-2022-3104",
"notes": [
{
"category": "description",
"text": "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzul\u00e4ssigen Einschr\u00e4nkungen, Puffer\u00fcberl\u00e4ufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien."
}
],
"product_status": {
"known_affected": [
"T000126",
"T028071"
]
},
"release_date": "2023-06-12T22:00:00.000+00:00",
"title": "CVE-2022-3104"
},
{
"cve": "CVE-2022-3028",
"notes": [
{
"category": "description",
"text": "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzul\u00e4ssigen Einschr\u00e4nkungen, Puffer\u00fcberl\u00e4ufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien."
}
],
"product_status": {
"known_affected": [
"T000126",
"T028071"
]
},
"release_date": "2023-06-12T22:00:00.000+00:00",
"title": "CVE-2022-3028"
},
{
"cve": "CVE-2022-30065",
"notes": [
{
"category": "description",
"text": "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzul\u00e4ssigen Einschr\u00e4nkungen, Puffer\u00fcberl\u00e4ufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien."
}
],
"product_status": {
"known_affected": [
"T000126",
"T028071"
]
},
"release_date": "2023-06-12T22:00:00.000+00:00",
"title": "CVE-2022-30065"
},
{
"cve": "CVE-2022-2978",
"notes": [
{
"category": "description",
"text": "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzul\u00e4ssigen Einschr\u00e4nkungen, Puffer\u00fcberl\u00e4ufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien."
}
],
"product_status": {
"known_affected": [
"T000126",
"T028071"
]
},
"release_date": "2023-06-12T22:00:00.000+00:00",
"title": "CVE-2022-2978"
},
{
"cve": "CVE-2022-2959",
"notes": [
{
"category": "description",
"text": "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzul\u00e4ssigen Einschr\u00e4nkungen, Puffer\u00fcberl\u00e4ufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien."
}
],
"product_status": {
"known_affected": [
"T000126",
"T028071"
]
},
"release_date": "2023-06-12T22:00:00.000+00:00",
"title": "CVE-2022-2959"
},
{
"cve": "CVE-2022-2905",
"notes": [
{
"category": "description",
"text": "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzul\u00e4ssigen Einschr\u00e4nkungen, Puffer\u00fcberl\u00e4ufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien."
}
],
"product_status": {
"known_affected": [
"T000126",
"T028071"
]
},
"release_date": "2023-06-12T22:00:00.000+00:00",
"title": "CVE-2022-2905"
},
{
"cve": "CVE-2022-28391",
"notes": [
{
"category": "description",
"text": "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzul\u00e4ssigen Einschr\u00e4nkungen, Puffer\u00fcberl\u00e4ufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien."
}
],
"product_status": {
"known_affected": [
"T000126",
"T028071"
]
},
"release_date": "2023-06-12T22:00:00.000+00:00",
"title": "CVE-2022-28391"
},
{
"cve": "CVE-2022-2663",
"notes": [
{
"category": "description",
"text": "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzul\u00e4ssigen Einschr\u00e4nkungen, Puffer\u00fcberl\u00e4ufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien."
}
],
"product_status": {
"known_affected": [
"T000126",
"T028071"
]
},
"release_date": "2023-06-12T22:00:00.000+00:00",
"title": "CVE-2022-2663"
},
{
"cve": "CVE-2022-26373",
"notes": [
{
"category": "description",
"text": "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzul\u00e4ssigen Einschr\u00e4nkungen, Puffer\u00fcberl\u00e4ufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien."
}
],
"product_status": {
"known_affected": [
"T000126",
"T028071"
]
},
"release_date": "2023-06-12T22:00:00.000+00:00",
"title": "CVE-2022-26373"
},
{
"cve": "CVE-2022-2602",
"notes": [
{
"category": "description",
"text": "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzul\u00e4ssigen Einschr\u00e4nkungen, Puffer\u00fcberl\u00e4ufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien."
}
],
"product_status": {
"known_affected": [
"T000126",
"T028071"
]
},
"release_date": "2023-06-12T22:00:00.000+00:00",
"title": "CVE-2022-2602"
},
{
"cve": "CVE-2022-2588",
"notes": [
{
"category": "description",
"text": "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzul\u00e4ssigen Einschr\u00e4nkungen, Puffer\u00fcberl\u00e4ufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien."
}
],
"product_status": {
"known_affected": [
"T000126",
"T028071"
]
},
"release_date": "2023-06-12T22:00:00.000+00:00",
"title": "CVE-2022-2588"
},
{
"cve": "CVE-2022-2586",
"notes": [
{
"category": "description",
"text": "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzul\u00e4ssigen Einschr\u00e4nkungen, Puffer\u00fcberl\u00e4ufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien."
}
],
"product_status": {
"known_affected": [
"T000126",
"T028071"
]
},
"release_date": "2023-06-12T22:00:00.000+00:00",
"title": "CVE-2022-2586"
},
{
"cve": "CVE-2022-2585",
"notes": [
{
"category": "description",
"text": "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzul\u00e4ssigen Einschr\u00e4nkungen, Puffer\u00fcberl\u00e4ufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien."
}
],
"product_status": {
"known_affected": [
"T000126",
"T028071"
]
},
"release_date": "2023-06-12T22:00:00.000+00:00",
"title": "CVE-2022-2585"
},
{
"cve": "CVE-2022-2503",
"notes": [
{
"category": "description",
"text": "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzul\u00e4ssigen Einschr\u00e4nkungen, Puffer\u00fcberl\u00e4ufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien."
}
],
"product_status": {
"known_affected": [
"T000126",
"T028071"
]
},
"release_date": "2023-06-12T22:00:00.000+00:00",
"title": "CVE-2022-2503"
},
{
"cve": "CVE-2022-2327",
"notes": [
{
"category": "description",
"text": "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzul\u00e4ssigen Einschr\u00e4nkungen, Puffer\u00fcberl\u00e4ufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien."
}
],
"product_status": {
"known_affected": [
"T000126",
"T028071"
]
},
"release_date": "2023-06-12T22:00:00.000+00:00",
"title": "CVE-2022-2327"
},
{
"cve": "CVE-2022-23219",
"notes": [
{
"category": "description",
"text": "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzul\u00e4ssigen Einschr\u00e4nkungen, Puffer\u00fcberl\u00e4ufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien."
}
],
"product_status": {
"known_affected": [
"T000126",
"T028071"
]
},
"release_date": "2023-06-12T22:00:00.000+00:00",
"title": "CVE-2022-23219"
},
{
"cve": "CVE-2022-23218",
"notes": [
{
"category": "description",
"text": "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzul\u00e4ssigen Einschr\u00e4nkungen, Puffer\u00fcberl\u00e4ufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien."
}
],
"product_status": {
"known_affected": [
"T000126",
"T028071"
]
},
"release_date": "2023-06-12T22:00:00.000+00:00",
"title": "CVE-2022-23218"
},
{
"cve": "CVE-2022-2274",
"notes": [
{
"category": "description",
"text": "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzul\u00e4ssigen Einschr\u00e4nkungen, Puffer\u00fcberl\u00e4ufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien."
}
],
"product_status": {
"known_affected": [
"T000126",
"T028071"
]
},
"release_date": "2023-06-12T22:00:00.000+00:00",
"title": "CVE-2022-2274"
},
{
"cve": "CVE-2022-2153",
"notes": [
{
"category": "description",
"text": "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzul\u00e4ssigen Einschr\u00e4nkungen, Puffer\u00fcberl\u00e4ufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien."
}
],
"product_status": {
"known_affected": [
"T000126",
"T028071"
]
},
"release_date": "2023-06-12T22:00:00.000+00:00",
"title": "CVE-2022-2153"
},
{
"cve": "CVE-2022-21505",
"notes": [
{
"category": "description",
"text": "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzul\u00e4ssigen Einschr\u00e4nkungen, Puffer\u00fcberl\u00e4ufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien."
}
],
"product_status": {
"known_affected": [
"T000126",
"T028071"
]
},
"release_date": "2023-06-12T22:00:00.000+00:00",
"title": "CVE-2022-21505"
},
{
"cve": "CVE-2022-21233",
"notes": [
{
"category": "description",
"text": "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzul\u00e4ssigen Einschr\u00e4nkungen, Puffer\u00fcberl\u00e4ufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien."
}
],
"product_status": {
"known_affected": [
"T000126",
"T028071"
]
},
"release_date": "2023-06-12T22:00:00.000+00:00",
"title": "CVE-2022-21233"
},
{
"cve": "CVE-2022-21166",
"notes": [
{
"category": "description",
"text": "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzul\u00e4ssigen Einschr\u00e4nkungen, Puffer\u00fcberl\u00e4ufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien."
}
],
"product_status": {
"known_affected": [
"T000126",
"T028071"
]
},
"release_date": "2023-06-12T22:00:00.000+00:00",
"title": "CVE-2022-21166"
},
{
"cve": "CVE-2022-21125",
"notes": [
{
"category": "description",
"text": "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzul\u00e4ssigen Einschr\u00e4nkungen, Puffer\u00fcberl\u00e4ufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien."
}
],
"product_status": {
"known_affected": [
"T000126",
"T028071"
]
},
"release_date": "2023-06-12T22:00:00.000+00:00",
"title": "CVE-2022-21125"
},
{
"cve": "CVE-2022-21123",
"notes": [
{
"category": "description",
"text": "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzul\u00e4ssigen Einschr\u00e4nkungen, Puffer\u00fcberl\u00e4ufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien."
}
],
"product_status": {
"known_affected": [
"T000126",
"T028071"
]
},
"release_date": "2023-06-12T22:00:00.000+00:00",
"title": "CVE-2022-21123"
},
{
"cve": "CVE-2022-2097",
"notes": [
{
"category": "description",
"text": "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzul\u00e4ssigen Einschr\u00e4nkungen, Puffer\u00fcberl\u00e4ufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien."
}
],
"product_status": {
"known_affected": [
"T000126",
"T028071"
]
},
"release_date": "2023-06-12T22:00:00.000+00:00",
"title": "CVE-2022-2097"
},
{
"cve": "CVE-2022-2078",
"notes": [
{
"category": "description",
"text": "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzul\u00e4ssigen Einschr\u00e4nkungen, Puffer\u00fcberl\u00e4ufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien."
}
],
"product_status": {
"known_affected": [
"T000126",
"T028071"
]
},
"release_date": "2023-06-12T22:00:00.000+00:00",
"title": "CVE-2022-2078"
},
{
"cve": "CVE-2022-2068",
"notes": [
{
"category": "description",
"text": "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzul\u00e4ssigen Einschr\u00e4nkungen, Puffer\u00fcberl\u00e4ufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien."
}
],
"product_status": {
"known_affected": [
"T000126",
"T028071"
]
},
"release_date": "2023-06-12T22:00:00.000+00:00",
"title": "CVE-2022-2068"
},
{
"cve": "CVE-2022-20572",
"notes": [
{
"category": "description",
"text": "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzul\u00e4ssigen Einschr\u00e4nkungen, Puffer\u00fcberl\u00e4ufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien."
}
],
"product_status": {
"known_affected": [
"T000126",
"T028071"
]
},
"release_date": "2023-06-12T22:00:00.000+00:00",
"title": "CVE-2022-20572"
},
{
"cve": "CVE-2022-20566",
"notes": [
{
"category": "description",
"text": "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzul\u00e4ssigen Einschr\u00e4nkungen, Puffer\u00fcberl\u00e4ufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien."
}
],
"product_status": {
"known_affected": [
"T000126",
"T028071"
]
},
"release_date": "2023-06-12T22:00:00.000+00:00",
"title": "CVE-2022-20566"
},
{
"cve": "CVE-2022-20422",
"notes": [
{
"category": "description",
"text": "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzul\u00e4ssigen Einschr\u00e4nkungen, Puffer\u00fcberl\u00e4ufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien."
}
],
"product_status": {
"known_affected": [
"T000126",
"T028071"
]
},
"release_date": "2023-06-12T22:00:00.000+00:00",
"title": "CVE-2022-20422"
},
{
"cve": "CVE-2022-20421",
"notes": [
{
"category": "description",
"text": "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzul\u00e4ssigen Einschr\u00e4nkungen, Puffer\u00fcberl\u00e4ufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien."
}
],
"product_status": {
"known_affected": [
"T000126",
"T028071"
]
},
"release_date": "2023-06-12T22:00:00.000+00:00",
"title": "CVE-2022-20421"
},
{
"cve": "CVE-2022-1882",
"notes": [
{
"category": "description",
"text": "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzul\u00e4ssigen Einschr\u00e4nkungen, Puffer\u00fcberl\u00e4ufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien."
}
],
"product_status": {
"known_affected": [
"T000126",
"T028071"
]
},
"release_date": "2023-06-12T22:00:00.000+00:00",
"title": "CVE-2022-1882"
},
{
"cve": "CVE-2022-1852",
"notes": [
{
"category": "description",
"text": "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzul\u00e4ssigen Einschr\u00e4nkungen, Puffer\u00fcberl\u00e4ufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien."
}
],
"product_status": {
"known_affected": [
"T000126",
"T028071"
]
},
"release_date": "2023-06-12T22:00:00.000+00:00",
"title": "CVE-2022-1852"
},
{
"cve": "CVE-2022-1679",
"notes": [
{
"category": "description",
"text": "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzul\u00e4ssigen Einschr\u00e4nkungen, Puffer\u00fcberl\u00e4ufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien."
}
],
"product_status": {
"known_affected": [
"T000126",
"T028071"
]
},
"release_date": "2023-06-12T22:00:00.000+00:00",
"title": "CVE-2022-1679"
},
{
"cve": "CVE-2022-1473",
"notes": [
{
"category": "description",
"text": "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzul\u00e4ssigen Einschr\u00e4nkungen, Puffer\u00fcberl\u00e4ufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien."
}
],
"product_status": {
"known_affected": [
"T000126",
"T028071"
]
},
"release_date": "2023-06-12T22:00:00.000+00:00",
"title": "CVE-2022-1473"
},
{
"cve": "CVE-2022-1462",
"notes": [
{
"category": "description",
"text": "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzul\u00e4ssigen Einschr\u00e4nkungen, Puffer\u00fcberl\u00e4ufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien."
}
],
"product_status": {
"known_affected": [
"T000126",
"T028071"
]
},
"release_date": "2023-06-12T22:00:00.000+00:00",
"title": "CVE-2022-1462"
},
{
"cve": "CVE-2022-1434",
"notes": [
{
"category": "description",
"text": "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzul\u00e4ssigen Einschr\u00e4nkungen, Puffer\u00fcberl\u00e4ufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien."
}
],
"product_status": {
"known_affected": [
"T000126",
"T028071"
]
},
"release_date": "2023-06-12T22:00:00.000+00:00",
"title": "CVE-2022-1434"
},
{
"cve": "CVE-2022-1343",
"notes": [
{
"category": "description",
"text": "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzul\u00e4ssigen Einschr\u00e4nkungen, Puffer\u00fcberl\u00e4ufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien."
}
],
"product_status": {
"known_affected": [
"T000126",
"T028071"
]
},
"release_date": "2023-06-12T22:00:00.000+00:00",
"title": "CVE-2022-1343"
},
{
"cve": "CVE-2022-1292",
"notes": [
{
"category": "description",
"text": "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzul\u00e4ssigen Einschr\u00e4nkungen, Puffer\u00fcberl\u00e4ufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien."
}
],
"product_status": {
"known_affected": [
"T000126",
"T028071"
]
},
"release_date": "2023-06-12T22:00:00.000+00:00",
"title": "CVE-2022-1292"
},
{
"cve": "CVE-2022-1184",
"notes": [
{
"category": "description",
"text": "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzul\u00e4ssigen Einschr\u00e4nkungen, Puffer\u00fcberl\u00e4ufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien."
}
],
"product_status": {
"known_affected": [
"T000126",
"T028071"
]
},
"release_date": "2023-06-12T22:00:00.000+00:00",
"title": "CVE-2022-1184"
},
{
"cve": "CVE-2022-1012",
"notes": [
{
"category": "description",
"text": "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzul\u00e4ssigen Einschr\u00e4nkungen, Puffer\u00fcberl\u00e4ufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien."
}
],
"product_status": {
"known_affected": [
"T000126",
"T028071"
]
},
"release_date": "2023-06-12T22:00:00.000+00:00",
"title": "CVE-2022-1012"
},
{
"cve": "CVE-2022-0171",
"notes": [
{
"category": "description",
"text": "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzul\u00e4ssigen Einschr\u00e4nkungen, Puffer\u00fcberl\u00e4ufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien."
}
],
"product_status": {
"known_affected": [
"T000126",
"T028071"
]
},
"release_date": "2023-06-12T22:00:00.000+00:00",
"title": "CVE-2022-0171"
},
{
"cve": "CVE-2021-42386",
"notes": [
{
"category": "description",
"text": "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzul\u00e4ssigen Einschr\u00e4nkungen, Puffer\u00fcberl\u00e4ufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien."
}
],
"product_status": {
"known_affected": [
"T000126",
"T028071"
]
},
"release_date": "2023-06-12T22:00:00.000+00:00",
"title": "CVE-2021-42386"
},
{
"cve": "CVE-2021-42385",
"notes": [
{
"category": "description",
"text": "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzul\u00e4ssigen Einschr\u00e4nkungen, Puffer\u00fcberl\u00e4ufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien."
}
],
"product_status": {
"known_affected": [
"T000126",
"T028071"
]
},
"release_date": "2023-06-12T22:00:00.000+00:00",
"title": "CVE-2021-42385"
},
{
"cve": "CVE-2021-42384",
"notes": [
{
"category": "description",
"text": "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzul\u00e4ssigen Einschr\u00e4nkungen, Puffer\u00fcberl\u00e4ufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien."
}
],
"product_status": {
"known_affected": [
"T000126",
"T028071"
]
},
"release_date": "2023-06-12T22:00:00.000+00:00",
"title": "CVE-2021-42384"
},
{
"cve": "CVE-2021-42383",
"notes": [
{
"category": "description",
"text": "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzul\u00e4ssigen Einschr\u00e4nkungen, Puffer\u00fcberl\u00e4ufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien."
}
],
"product_status": {
"known_affected": [
"T000126",
"T028071"
]
},
"release_date": "2023-06-12T22:00:00.000+00:00",
"title": "CVE-2021-42383"
},
{
"cve": "CVE-2021-42382",
"notes": [
{
"category": "description",
"text": "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzul\u00e4ssigen Einschr\u00e4nkungen, Puffer\u00fcberl\u00e4ufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien."
}
],
"product_status": {
"known_affected": [
"T000126",
"T028071"
]
},
"release_date": "2023-06-12T22:00:00.000+00:00",
"title": "CVE-2021-42382"
},
{
"cve": "CVE-2021-42381",
"notes": [
{
"category": "description",
"text": "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzul\u00e4ssigen Einschr\u00e4nkungen, Puffer\u00fcberl\u00e4ufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien."
}
],
"product_status": {
"known_affected": [
"T000126",
"T028071"
]
},
"release_date": "2023-06-12T22:00:00.000+00:00",
"title": "CVE-2021-42381"
},
{
"cve": "CVE-2021-42380",
"notes": [
{
"category": "description",
"text": "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzul\u00e4ssigen Einschr\u00e4nkungen, Puffer\u00fcberl\u00e4ufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien."
}
],
"product_status": {
"known_affected": [
"T000126",
"T028071"
]
},
"release_date": "2023-06-12T22:00:00.000+00:00",
"title": "CVE-2021-42380"
},
{
"cve": "CVE-2021-42379",
"notes": [
{
"category": "description",
"text": "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzul\u00e4ssigen Einschr\u00e4nkungen, Puffer\u00fcberl\u00e4ufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien."
}
],
"product_status": {
"known_affected": [
"T000126",
"T028071"
]
},
"release_date": "2023-06-12T22:00:00.000+00:00",
"title": "CVE-2021-42379"
},
{
"cve": "CVE-2021-42378",
"notes": [
{
"category": "description",
"text": "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzul\u00e4ssigen Einschr\u00e4nkungen, Puffer\u00fcberl\u00e4ufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien."
}
],
"product_status": {
"known_affected": [
"T000126",
"T028071"
]
},
"release_date": "2023-06-12T22:00:00.000+00:00",
"title": "CVE-2021-42378"
},
{
"cve": "CVE-2021-42377",
"notes": [
{
"category": "description",
"text": "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzul\u00e4ssigen Einschr\u00e4nkungen, Puffer\u00fcberl\u00e4ufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien."
}
],
"product_status": {
"known_affected": [
"T000126",
"T028071"
]
},
"release_date": "2023-06-12T22:00:00.000+00:00",
"title": "CVE-2021-42377"
},
{
"cve": "CVE-2021-42376",
"notes": [
{
"category": "description",
"text": "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzul\u00e4ssigen Einschr\u00e4nkungen, Puffer\u00fcberl\u00e4ufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien."
}
],
"product_status": {
"known_affected": [
"T000126",
"T028071"
]
},
"release_date": "2023-06-12T22:00:00.000+00:00",
"title": "CVE-2021-42376"
},
{
"cve": "CVE-2021-42375",
"notes": [
{
"category": "description",
"text": "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzul\u00e4ssigen Einschr\u00e4nkungen, Puffer\u00fcberl\u00e4ufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien."
}
],
"product_status": {
"known_affected": [
"T000126",
"T028071"
]
},
"release_date": "2023-06-12T22:00:00.000+00:00",
"title": "CVE-2021-42375"
},
{
"cve": "CVE-2021-42374",
"notes": [
{
"category": "description",
"text": "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzul\u00e4ssigen Einschr\u00e4nkungen, Puffer\u00fcberl\u00e4ufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien."
}
],
"product_status": {
"known_affected": [
"T000126",
"T028071"
]
},
"release_date": "2023-06-12T22:00:00.000+00:00",
"title": "CVE-2021-42374"
},
{
"cve": "CVE-2021-42373",
"notes": [
{
"category": "description",
"text": "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzul\u00e4ssigen Einschr\u00e4nkungen, Puffer\u00fcberl\u00e4ufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien."
}
],
"product_status": {
"known_affected": [
"T000126",
"T028071"
]
},
"release_date": "2023-06-12T22:00:00.000+00:00",
"title": "CVE-2021-42373"
},
{
"cve": "CVE-2021-4037",
"notes": [
{
"category": "description",
"text": "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzul\u00e4ssigen Einschr\u00e4nkungen, Puffer\u00fcberl\u00e4ufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien."
}
],
"product_status": {
"known_affected": [
"T000126",
"T028071"
]
},
"release_date": "2023-06-12T22:00:00.000+00:00",
"title": "CVE-2021-4037"
},
{
"cve": "CVE-2021-3999",
"notes": [
{
"category": "description",
"text": "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzul\u00e4ssigen Einschr\u00e4nkungen, Puffer\u00fcberl\u00e4ufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien."
}
],
"product_status": {
"known_affected": [
"T000126",
"T028071"
]
},
"release_date": "2023-06-12T22:00:00.000+00:00",
"title": "CVE-2021-3999"
},
{
"cve": "CVE-2021-3998",
"notes": [
{
"category": "description",
"text": "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzul\u00e4ssigen Einschr\u00e4nkungen, Puffer\u00fcberl\u00e4ufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien."
}
],
"product_status": {
"known_affected": [
"T000126",
"T028071"
]
},
"release_date": "2023-06-12T22:00:00.000+00:00",
"title": "CVE-2021-3998"
},
{
"cve": "CVE-2021-38604",
"notes": [
{
"category": "description",
"text": "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzul\u00e4ssigen Einschr\u00e4nkungen, Puffer\u00fcberl\u00e4ufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien."
}
],
"product_status": {
"known_affected": [
"T000126",
"T028071"
]
},
"release_date": "2023-06-12T22:00:00.000+00:00",
"title": "CVE-2021-38604"
},
{
"cve": "CVE-2021-3759",
"notes": [
{
"category": "description",
"text": "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzul\u00e4ssigen Einschr\u00e4nkungen, Puffer\u00fcberl\u00e4ufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien."
}
],
"product_status": {
"known_affected": [
"T000126",
"T028071"
]
},
"release_date": "2023-06-12T22:00:00.000+00:00",
"title": "CVE-2021-3759"
},
{
"cve": "CVE-2021-35942",
"notes": [
{
"category": "description",
"text": "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzul\u00e4ssigen Einschr\u00e4nkungen, Puffer\u00fcberl\u00e4ufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien."
}
],
"product_status": {
"known_affected": [
"T000126",
"T028071"
]
},
"release_date": "2023-06-12T22:00:00.000+00:00",
"title": "CVE-2021-35942"
},
{
"cve": "CVE-2021-33655",
"notes": [
{
"category": "description",
"text": "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzul\u00e4ssigen Einschr\u00e4nkungen, Puffer\u00fcberl\u00e4ufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien."
}
],
"product_status": {
"known_affected": [
"T000126",
"T028071"
]
},
"release_date": "2023-06-12T22:00:00.000+00:00",
"title": "CVE-2021-33655"
},
{
"cve": "CVE-2021-33574",
"notes": [
{
"category": "description",
"text": "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzul\u00e4ssigen Einschr\u00e4nkungen, Puffer\u00fcberl\u00e4ufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien."
}
],
"product_status": {
"known_affected": [
"T000126",
"T028071"
]
},
"release_date": "2023-06-12T22:00:00.000+00:00",
"title": "CVE-2021-33574"
},
{
"cve": "CVE-2021-3326",
"notes": [
{
"category": "description",
"text": "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzul\u00e4ssigen Einschr\u00e4nkungen, Puffer\u00fcberl\u00e4ufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien."
}
],
"product_status": {
"known_affected": [
"T000126",
"T028071"
]
},
"release_date": "2023-06-12T22:00:00.000+00:00",
"title": "CVE-2021-3326"
},
{
"cve": "CVE-2021-28831",
"notes": [
{
"category": "description",
"text": "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzul\u00e4ssigen Einschr\u00e4nkungen, Puffer\u00fcberl\u00e4ufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien."
}
],
"product_status": {
"known_affected": [
"T000126",
"T028071"
]
},
"release_date": "2023-06-12T22:00:00.000+00:00",
"title": "CVE-2021-28831"
},
{
"cve": "CVE-2021-27645",
"notes": [
{
"category": "description",
"text": "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzul\u00e4ssigen Einschr\u00e4nkungen, Puffer\u00fcberl\u00e4ufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien."
}
],
"product_status": {
"known_affected": [
"T000126",
"T028071"
]
},
"release_date": "2023-06-12T22:00:00.000+00:00",
"title": "CVE-2021-27645"
},
{
"cve": "CVE-2021-20269",
"notes": [
{
"category": "description",
"text": "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzul\u00e4ssigen Einschr\u00e4nkungen, Puffer\u00fcberl\u00e4ufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien."
}
],
"product_status": {
"known_affected": [
"T000126",
"T028071"
]
},
"release_date": "2023-06-12T22:00:00.000+00:00",
"title": "CVE-2021-20269"
},
{
"cve": "CVE-2020-29562",
"notes": [
{
"category": "description",
"text": "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzul\u00e4ssigen Einschr\u00e4nkungen, Puffer\u00fcberl\u00e4ufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien."
}
],
"product_status": {
"known_affected": [
"T000126",
"T028071"
]
},
"release_date": "2023-06-12T22:00:00.000+00:00",
"title": "CVE-2020-29562"
},
{
"cve": "CVE-2020-27618",
"notes": [
{
"category": "description",
"text": "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzul\u00e4ssigen Einschr\u00e4nkungen, Puffer\u00fcberl\u00e4ufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien."
}
],
"product_status": {
"known_affected": [
"T000126",
"T028071"
]
},
"release_date": "2023-06-12T22:00:00.000+00:00",
"title": "CVE-2020-27618"
},
{
"cve": "CVE-2020-1752",
"notes": [
{
"category": "description",
"text": "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzul\u00e4ssigen Einschr\u00e4nkungen, Puffer\u00fcberl\u00e4ufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien."
}
],
"product_status": {
"known_affected": [
"T000126",
"T028071"
]
},
"release_date": "2023-06-12T22:00:00.000+00:00",
"title": "CVE-2020-1752"
},
{
"cve": "CVE-2020-10029",
"notes": [
{
"category": "description",
"text": "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzul\u00e4ssigen Einschr\u00e4nkungen, Puffer\u00fcberl\u00e4ufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien."
}
],
"product_status": {
"known_affected": [
"T000126",
"T028071"
]
},
"release_date": "2023-06-12T22:00:00.000+00:00",
"title": "CVE-2020-10029"
},
{
"cve": "CVE-2019-25013",
"notes": [
{
"category": "description",
"text": "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzul\u00e4ssigen Einschr\u00e4nkungen, Puffer\u00fcberl\u00e4ufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien."
}
],
"product_status": {
"known_affected": [
"T000126",
"T028071"
]
},
"release_date": "2023-06-12T22:00:00.000+00:00",
"title": "CVE-2019-25013"
},
{
"cve": "CVE-2018-13405",
"notes": [
{
"category": "description",
"text": "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzul\u00e4ssigen Einschr\u00e4nkungen, Puffer\u00fcberl\u00e4ufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien."
}
],
"product_status": {
"known_affected": [
"T000126",
"T028071"
]
},
"release_date": "2023-06-12T22:00:00.000+00:00",
"title": "CVE-2018-13405"
},
{
"cve": "CVE-2016-10228",
"notes": [
{
"category": "description",
"text": "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzul\u00e4ssigen Einschr\u00e4nkungen, Puffer\u00fcberl\u00e4ufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien."
}
],
"product_status": {
"known_affected": [
"T000126",
"T028071"
]
},
"release_date": "2023-06-12T22:00:00.000+00:00",
"title": "CVE-2016-10228"
}
]
}
WID-SEC-W-2022-2028
Vulnerability from csaf_certbund - Published: 2021-11-09 23:00 - Updated: 2025-01-19 23:00Notes
{
"document": {
"aggregate_severity": {
"text": "hoch"
},
"category": "csaf_base",
"csaf_version": "2.0",
"distribution": {
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "de-DE",
"notes": [
{
"category": "legal_disclaimer",
"text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen."
},
{
"category": "description",
"text": "BusyBox ist ein Computerprogramm, das verschiedene Standard-Unix-Dienstprogramme in einem einzelnen Programm vereint.",
"title": "Produktbeschreibung"
},
{
"category": "summary",
"text": "Ein entfernter, anonymer oder authentisierter Angreifer kann mehrere Schwachstellen in BusyBox ausnutzen, um einen Denial of Service Angriff durchzuf\u00fchren, Informationen offenzulegen oder beliebigen Code auszuf\u00fchren.",
"title": "Angriff"
},
{
"category": "general",
"text": "- Linux\n- Sonstiges\n- UNIX",
"title": "Betroffene Betriebssysteme"
}
],
"publisher": {
"category": "other",
"contact_details": "csaf-provider@cert-bund.de",
"name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik",
"namespace": "https://www.bsi.bund.de"
},
"references": [
{
"category": "self",
"summary": "WID-SEC-W-2022-2028 - CSAF Version",
"url": "https://wid.cert-bund.de/.well-known/csaf/white/2021/wid-sec-w-2022-2028.json"
},
{
"category": "self",
"summary": "WID-SEC-2022-2028 - Portal Version",
"url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2022-2028"
},
{
"category": "external",
"summary": "JFrog Blog vom 2021-11-09",
"url": "https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-5179-1 vom 2021-12-07",
"url": "https://ubuntu.com/security/notices/USN-5179-1"
},
{
"category": "external",
"summary": "Amazon Linux Security Advisory ALAS-2022-1558 vom 2022-01-20",
"url": "https://alas.aws.amazon.com/ALAS-2022-1558.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2022:0135-1 vom 2022-01-20",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2022-January/010031.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2022:0135-2 vom 2022-02-14",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2022-February/010220.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2022:3959-1 vom 2022-11-11",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2022-November/012904.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2022:4253-1 vom 2022-11-28",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2022-November/013126.html"
},
{
"category": "external",
"summary": "Gentoo Linux Security Advisory GLSA-202407-17 vom 2024-07-05",
"url": "https://security.gentoo.org/glsa/202407-17"
},
{
"category": "external",
"summary": "Debian Security Advisory DLA-4019 vom 2025-01-19",
"url": "https://lists.debian.org/debian-lts-announce/2025/01/msg00012.html"
}
],
"source_lang": "en-US",
"title": "BusyBox: Mehrere Schwachstellen",
"tracking": {
"current_release_date": "2025-01-19T23:00:00.000+00:00",
"generator": {
"date": "2025-01-20T09:28:11.314+00:00",
"engine": {
"name": "BSI-WID",
"version": "1.3.10"
}
},
"id": "WID-SEC-W-2022-2028",
"initial_release_date": "2021-11-09T23:00:00.000+00:00",
"revision_history": [
{
"date": "2021-11-09T23:00:00.000+00:00",
"number": "1",
"summary": "Initiale Fassung"
},
{
"date": "2021-11-16T23:00:00.000+00:00",
"number": "2",
"summary": "Referenz(en) aufgenommen: FEDORA-2021-5A95823596"
},
{
"date": "2021-12-07T23:00:00.000+00:00",
"number": "3",
"summary": "Neue Updates von Ubuntu aufgenommen"
},
{
"date": "2022-01-19T23:00:00.000+00:00",
"number": "4",
"summary": "Neue Updates von Amazon aufgenommen"
},
{
"date": "2022-01-20T23:00:00.000+00:00",
"number": "5",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2022-02-14T23:00:00.000+00:00",
"number": "6",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2022-11-13T23:00:00.000+00:00",
"number": "7",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2022-11-28T23:00:00.000+00:00",
"number": "8",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2024-07-04T22:00:00.000+00:00",
"number": "9",
"summary": "Neue Updates von Gentoo aufgenommen"
},
{
"date": "2025-01-19T23:00:00.000+00:00",
"number": "10",
"summary": "Neue Updates von Debian aufgenommen"
}
],
"status": "final",
"version": "10"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Amazon Linux 2",
"product": {
"name": "Amazon Linux 2",
"product_id": "398363",
"product_identification_helper": {
"cpe": "cpe:/o:amazon:linux_2:-"
}
}
}
],
"category": "vendor",
"name": "Amazon"
},
{
"branches": [
{
"category": "product_name",
"name": "Debian Linux",
"product": {
"name": "Debian Linux",
"product_id": "2951",
"product_identification_helper": {
"cpe": "cpe:/o:debian:debian_linux:-"
}
}
}
],
"category": "vendor",
"name": "Debian"
},
{
"branches": [
{
"category": "product_name",
"name": "Gentoo Linux",
"product": {
"name": "Gentoo Linux",
"product_id": "T012167",
"product_identification_helper": {
"cpe": "cpe:/o:gentoo:linux:-"
}
}
}
],
"category": "vendor",
"name": "Gentoo"
},
{
"branches": [
{
"category": "product_name",
"name": "Open Source BusyBox",
"product": {
"name": "Open Source BusyBox",
"product_id": "T013362",
"product_identification_helper": {
"cpe": "cpe:/a:busybox:busybox:-"
}
}
}
],
"category": "vendor",
"name": "Open Source"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux",
"product": {
"name": "SUSE Linux",
"product_id": "T002207",
"product_identification_helper": {
"cpe": "cpe:/o:suse:suse_linux:-"
}
}
}
],
"category": "vendor",
"name": "SUSE"
},
{
"branches": [
{
"category": "product_name",
"name": "Ubuntu Linux",
"product": {
"name": "Ubuntu Linux",
"product_id": "T000126",
"product_identification_helper": {
"cpe": "cpe:/o:canonical:ubuntu_linux:-"
}
}
}
],
"category": "vendor",
"name": "Ubuntu"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2021-42373",
"notes": [
{
"category": "description",
"text": "In BusyBox existieren mehrere Schwachstellen. Ein entfernter anonymer oder authentisierter Angreifer kann diese Schwachstellen ausnutzen, um Informationen offenzulegen und einen Denial of Service zu verursachen."
}
],
"product_status": {
"known_affected": [
"2951",
"T002207",
"T000126",
"398363",
"T012167",
"T013362"
]
},
"release_date": "2021-11-09T23:00:00.000+00:00",
"title": "CVE-2021-42373"
},
{
"cve": "CVE-2021-42374",
"notes": [
{
"category": "description",
"text": "In BusyBox existieren mehrere Schwachstellen. Ein entfernter anonymer oder authentisierter Angreifer kann diese Schwachstellen ausnutzen, um Informationen offenzulegen und einen Denial of Service zu verursachen."
}
],
"product_status": {
"known_affected": [
"2951",
"T002207",
"T000126",
"398363",
"T012167",
"T013362"
]
},
"release_date": "2021-11-09T23:00:00.000+00:00",
"title": "CVE-2021-42374"
},
{
"cve": "CVE-2021-42375",
"notes": [
{
"category": "description",
"text": "In BusyBox existieren mehrere Schwachstellen. Ein entfernter anonymer oder authentisierter Angreifer kann diese Schwachstellen ausnutzen, um Informationen offenzulegen und einen Denial of Service zu verursachen."
}
],
"product_status": {
"known_affected": [
"2951",
"T002207",
"T000126",
"398363",
"T012167",
"T013362"
]
},
"release_date": "2021-11-09T23:00:00.000+00:00",
"title": "CVE-2021-42375"
},
{
"cve": "CVE-2021-42376",
"notes": [
{
"category": "description",
"text": "In BusyBox existieren mehrere Schwachstellen. Ein entfernter anonymer oder authentisierter Angreifer kann diese Schwachstellen ausnutzen, um Informationen offenzulegen und einen Denial of Service zu verursachen."
}
],
"product_status": {
"known_affected": [
"2951",
"T002207",
"T000126",
"398363",
"T012167",
"T013362"
]
},
"release_date": "2021-11-09T23:00:00.000+00:00",
"title": "CVE-2021-42376"
},
{
"cve": "CVE-2021-42377",
"notes": [
{
"category": "description",
"text": "In BusyBox existieren mehrere Schwachstellen. Ein authentisierter Angreifer kann diese Schwachstellen ausnutzen, um einen Denial of Service Zustand zu verursachen oder beliebigen Code zur Ausf\u00fchrung zu bringen."
}
],
"product_status": {
"known_affected": [
"2951",
"T002207",
"T000126",
"398363",
"T012167",
"T013362"
]
},
"release_date": "2021-11-09T23:00:00.000+00:00",
"title": "CVE-2021-42377"
},
{
"cve": "CVE-2021-42378",
"notes": [
{
"category": "description",
"text": "In BusyBox existieren mehrere Schwachstellen. Ein authentisierter Angreifer kann diese Schwachstellen ausnutzen, um einen Denial of Service Zustand zu verursachen oder beliebigen Code zur Ausf\u00fchrung zu bringen."
}
],
"product_status": {
"known_affected": [
"2951",
"T002207",
"T000126",
"398363",
"T012167",
"T013362"
]
},
"release_date": "2021-11-09T23:00:00.000+00:00",
"title": "CVE-2021-42378"
},
{
"cve": "CVE-2021-42379",
"notes": [
{
"category": "description",
"text": "In BusyBox existieren mehrere Schwachstellen. Ein authentisierter Angreifer kann diese Schwachstellen ausnutzen, um einen Denial of Service Zustand zu verursachen oder beliebigen Code zur Ausf\u00fchrung zu bringen."
}
],
"product_status": {
"known_affected": [
"2951",
"T002207",
"T000126",
"398363",
"T012167",
"T013362"
]
},
"release_date": "2021-11-09T23:00:00.000+00:00",
"title": "CVE-2021-42379"
},
{
"cve": "CVE-2021-42380",
"notes": [
{
"category": "description",
"text": "In BusyBox existieren mehrere Schwachstellen. Ein authentisierter Angreifer kann diese Schwachstellen ausnutzen, um einen Denial of Service Zustand zu verursachen oder beliebigen Code zur Ausf\u00fchrung zu bringen."
}
],
"product_status": {
"known_affected": [
"2951",
"T002207",
"T000126",
"398363",
"T012167",
"T013362"
]
},
"release_date": "2021-11-09T23:00:00.000+00:00",
"title": "CVE-2021-42380"
},
{
"cve": "CVE-2021-42381",
"notes": [
{
"category": "description",
"text": "In BusyBox existieren mehrere Schwachstellen. Ein authentisierter Angreifer kann diese Schwachstellen ausnutzen, um einen Denial of Service Zustand zu verursachen oder beliebigen Code zur Ausf\u00fchrung zu bringen."
}
],
"product_status": {
"known_affected": [
"2951",
"T002207",
"T000126",
"398363",
"T012167",
"T013362"
]
},
"release_date": "2021-11-09T23:00:00.000+00:00",
"title": "CVE-2021-42381"
},
{
"cve": "CVE-2021-42382",
"notes": [
{
"category": "description",
"text": "In BusyBox existieren mehrere Schwachstellen. Ein authentisierter Angreifer kann diese Schwachstellen ausnutzen, um einen Denial of Service Zustand zu verursachen oder beliebigen Code zur Ausf\u00fchrung zu bringen."
}
],
"product_status": {
"known_affected": [
"2951",
"T002207",
"T000126",
"398363",
"T012167",
"T013362"
]
},
"release_date": "2021-11-09T23:00:00.000+00:00",
"title": "CVE-2021-42382"
},
{
"cve": "CVE-2021-42383",
"notes": [
{
"category": "description",
"text": "In BusyBox existieren mehrere Schwachstellen. Ein authentisierter Angreifer kann diese Schwachstellen ausnutzen, um einen Denial of Service Zustand zu verursachen oder beliebigen Code zur Ausf\u00fchrung zu bringen."
}
],
"product_status": {
"known_affected": [
"2951",
"T002207",
"T000126",
"398363",
"T012167",
"T013362"
]
},
"release_date": "2021-11-09T23:00:00.000+00:00",
"title": "CVE-2021-42383"
},
{
"cve": "CVE-2021-42384",
"notes": [
{
"category": "description",
"text": "In BusyBox existieren mehrere Schwachstellen. Ein authentisierter Angreifer kann diese Schwachstellen ausnutzen, um einen Denial of Service Zustand zu verursachen oder beliebigen Code zur Ausf\u00fchrung zu bringen."
}
],
"product_status": {
"known_affected": [
"2951",
"T002207",
"T000126",
"398363",
"T012167",
"T013362"
]
},
"release_date": "2021-11-09T23:00:00.000+00:00",
"title": "CVE-2021-42384"
},
{
"cve": "CVE-2021-42385",
"notes": [
{
"category": "description",
"text": "In BusyBox existieren mehrere Schwachstellen. Ein authentisierter Angreifer kann diese Schwachstellen ausnutzen, um einen Denial of Service Zustand zu verursachen oder beliebigen Code zur Ausf\u00fchrung zu bringen."
}
],
"product_status": {
"known_affected": [
"2951",
"T002207",
"T000126",
"398363",
"T012167",
"T013362"
]
},
"release_date": "2021-11-09T23:00:00.000+00:00",
"title": "CVE-2021-42385"
},
{
"cve": "CVE-2021-42386",
"notes": [
{
"category": "description",
"text": "In BusyBox existieren mehrere Schwachstellen. Ein authentisierter Angreifer kann diese Schwachstellen ausnutzen, um einen Denial of Service Zustand zu verursachen oder beliebigen Code zur Ausf\u00fchrung zu bringen."
}
],
"product_status": {
"known_affected": [
"2951",
"T002207",
"T000126",
"398363",
"T012167",
"T013362"
]
},
"release_date": "2021-11-09T23:00:00.000+00:00",
"title": "CVE-2021-42386"
}
]
}
ICSA-23-080-07
Vulnerability from csaf_cisa - Published: 2023-03-14 00:00 - Updated: 2023-03-14 00:00Notes
{
"document": {
"acknowledgments": [
{
"organization": "Siemens ProductCERT",
"summary": "reporting these vulnerabilities to CISA."
}
],
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Disclosure is not limited",
"tlp": {
"label": "WHITE",
"url": "https://us-cert.cisa.gov/tlp/"
}
},
"notes": [
{
"category": "summary",
"text": "Multiple vulnerabilities affecting various third-party components of SCALANCE W-700 IEEE 802.11ax devices before V2.0 could allow an attacker to cause a denial of service condition, disclose sensitive data or violate the system integrity.\n\nSiemens has released an update for SCALANCE W-700 IEEE 802.11ax and recommends to update to the latest version.",
"title": "Summary"
},
{
"category": "general",
"text": "As a general security measure, Siemens strongly recommends to protect network access to devices with appropriate mechanisms. In order to operate the devices in a protected IT environment, Siemens recommends to configure the environment according to Siemens\u0027 operational guidelines for Industrial Security (Download: \nhttps://www.siemens.com/cert/operational-guidelines-industrial-security), and to follow the recommendations in the product manuals.\nAdditional information on Industrial Security by Siemens can be found at: https://www.siemens.com/industrialsecurity",
"title": "General Recommendations"
},
{
"category": "general",
"text": "For further inquiries on security vulnerabilities in Siemens products and solutions, please contact the Siemens ProductCERT: https://www.siemens.com/cert/advisories",
"title": "Additional Resources"
},
{
"category": "legal_disclaimer",
"text": "Siemens Security Advisories are subject to the terms and conditions contained in Siemens\u0027 underlying license terms or other applicable agreements previously agreed to with Siemens (hereinafter \"License Terms\"). To the extent applicable to information, software or documentation made available in or through a Siemens Security Advisory, the Terms of Use of Siemens\u0027 Global Website (https://www.siemens.com/terms_of_use, hereinafter \"Terms of Use\"), in particular Sections 8-10 of the Terms of Use, shall apply additionally. In case of conflicts, the License Terms shall prevail over the Terms of Use.",
"title": "Terms of Use"
},
{
"category": "legal_disclaimer",
"text": "All information products included in https://us-cert.cisa.gov/ics are provided \"as is\" for informational purposes only. The Department of Homeland Security (DHS) does not provide any warranties of any kind regarding any information contained within. DHS does not endorse any commercial product or service, referenced in this product or otherwise. Further dissemination of this product is governed by the Traffic Light Protocol (TLP) marking in the header. For more information about TLP, see https://us-cert.cisa.gov/tlp/.",
"title": "Legal Notice"
},
{
"category": "other",
"text": "This CISA CSAF advisory was converted from Siemens ProductCERT\u0027s CSAF advisory.",
"title": "Advisory Conversion Disclaimer"
},
{
"category": "other",
"text": "Multiple",
"title": "Critical infrastructure sectors"
},
{
"category": "other",
"text": "Worldwide",
"title": "Countries/areas deployed"
},
{
"category": "other",
"text": "Germany",
"title": "Company headquarters location"
},
{
"category": "general",
"text": "CISA recommends users take defensive measures to minimize the exploitation risk of this vulnerability.",
"title": "Recommended Practices"
},
{
"category": "general",
"text": "Minimize network exposure for all control system devices and/or systems, and ensure they are not accessible from the internet.",
"title": "Recommended Practices"
},
{
"category": "general",
"text": "Locate control system networks and remote devices behind firewalls and isolate them from business networks.",
"title": "Recommended Practices"
},
{
"category": "general",
"text": "When remote access is required, use more secure methods, such as Virtual Private Networks (VPNs), recognizing VPNs may have vulnerabilities and should be updated to the most recent version available. Also recognize VPN is only as secure as its connected devices.",
"title": "Recommended Practices"
},
{
"category": "general",
"text": "CISA reminds organizations to perform proper impact analysis and risk assessment prior to deploying defensive measures.",
"title": "Recommended Practices"
},
{
"category": "general",
"text": "CISA also provides a section for control systems security recommended practices on the ICS webpage on cisa.gov. Several CISA products detailing cyber defense best practices are available for reading and download, including Improving Industrial Control Systems Cybersecurity with Defense-in-Depth Strategies.",
"title": "Recommended Practices"
},
{
"category": "general",
"text": "CISA encourages organizations to implement recommended cybersecurity strategies for proactive defense of ICS assets. Additional mitigation guidance and recommended practices are publicly available on the ICS webpage at cisa.gov in the technical information paper, ICS-TIP-12-146-01B--Targeted Cyber Intrusion Detection and Mitigation Strategies.",
"title": "Recommended Practices"
},
{
"category": "general",
"text": "Organizations observing suspected malicious activity should follow established internal procedures and report findings to CISA for tracking and correlation against other incidents.",
"title": "Recommended Practices"
}
],
"publisher": {
"category": "other",
"contact_details": "central@cisa.dhs.gov",
"name": "CISA",
"namespace": "https://www.cisa.gov/"
},
"references": [
{
"category": "self",
"summary": "SSA-565386: Third-Party Component Vulnerabilities in SCALANCE W-700 IEEE 802.11ax devices before V2.0 - CSAF Version",
"url": "https://cert-portal.siemens.com/productcert/csaf/ssa-565386.json"
},
{
"category": "self",
"summary": "SSA-565386: Third-Party Component Vulnerabilities in SCALANCE W-700 IEEE 802.11ax devices before V2.0 - TXT Version",
"url": "https://cert-portal.siemens.com/productcert/txt/ssa-565386.txt"
},
{
"category": "self",
"summary": "SSA-565386: Third-Party Component Vulnerabilities in SCALANCE W-700 IEEE 802.11ax devices before V2.0 - PDF Version",
"url": "https://cert-portal.siemens.com/productcert/pdf/ssa-565386.pdf"
},
{
"category": "self",
"summary": "ICS Advisory ICSA-23-080-07 JSON",
"url": "https://raw.githubusercontent.com/cisagov/CSAF/develop/csaf_files/OT/white/2023/icsa-23-080-07.json"
},
{
"category": "self",
"summary": "ICS Advisory ICSA-23-080-07 - Web Version",
"url": "https://www.cisa.gov/news-events/ics-advisories/icsa-23-080-07"
},
{
"category": "external",
"summary": "Recommended Practices",
"url": "https://www.cisa.gov/uscert/ics/alerts/ICS-ALERT-10-301-01"
},
{
"category": "external",
"summary": "Recommended Practices",
"url": "https://www.cisa.gov/resources-tools/resources/ics-recommended-practices"
},
{
"category": "external",
"summary": "Recommended Practices",
"url": "https://www.cisa.gov/topics/industrial-control-systems"
},
{
"category": "external",
"summary": "Recommended Practices",
"url": "https://us-cert.cisa.gov/sites/default/files/recommended_practices/NCCIC_ICS-CERT_Defense_in_Depth_2016_S508C.pdf"
},
{
"category": "external",
"summary": "Recommended Practices",
"url": "https://www.cisa.gov/sites/default/files/publications/Cybersecurity_Best_Practices_for_Industrial_Control_Systems.pdf"
},
{
"category": "external",
"summary": "Recommended Practices",
"url": "https://www.cisa.gov/uscert/ics/tips/ICS-TIP-12-146-01B"
}
],
"title": "Siemens SCALANCE Third-Party",
"tracking": {
"current_release_date": "2023-03-14T00:00:00.000000Z",
"generator": {
"engine": {
"name": "CISA CSAF Generator",
"version": "1.0.0"
}
},
"id": "ICSA-23-080-07",
"initial_release_date": "2023-03-14T00:00:00.000000Z",
"revision_history": [
{
"date": "2023-03-14T00:00:00.000000Z",
"legacy_version": "1.0",
"number": "1",
"summary": "Publication Date"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version_range",
"name": "\u003cV2.0",
"product": {
"name": "SCALANCE WAM763-1 (6GK5763-1AL00-7DA0)",
"product_id": "CSAFPID-0001",
"product_identification_helper": {
"model_numbers": [
"6GK5763-1AL00-7DA0"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE WAM763-1 (6GK5763-1AL00-7DA0)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003cV2.0",
"product": {
"name": "SCALANCE WAM766-1 (EU) (6GK5766-1GE00-7DA0)",
"product_id": "CSAFPID-0002",
"product_identification_helper": {
"model_numbers": [
"6GK5766-1GE00-7DA0"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE WAM766-1 (EU) (6GK5766-1GE00-7DA0)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003cV2.0",
"product": {
"name": "SCALANCE WAM766-1 (US) (6GK5766-1GE00-7DB0)",
"product_id": "CSAFPID-0003",
"product_identification_helper": {
"model_numbers": [
"6GK5766-1GE00-7DB0"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE WAM766-1 (US) (6GK5766-1GE00-7DB0)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003cV2.0",
"product": {
"name": "SCALANCE WAM766-1 EEC (EU) (6GK5766-1GE00-7TA0)",
"product_id": "CSAFPID-0004",
"product_identification_helper": {
"model_numbers": [
"6GK5766-1GE00-7TA0"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE WAM766-1 EEC (EU) (6GK5766-1GE00-7TA0)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003cV2.0",
"product": {
"name": "SCALANCE WAM766-1 EEC (US) (6GK5766-1GE00-7TB0)",
"product_id": "CSAFPID-0005",
"product_identification_helper": {
"model_numbers": [
"6GK5766-1GE00-7TB0"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE WAM766-1 EEC (US) (6GK5766-1GE00-7TB0)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003cV2.0",
"product": {
"name": "SCALANCE WUM763-1 (6GK5763-1AL00-3DA0)",
"product_id": "CSAFPID-0006",
"product_identification_helper": {
"model_numbers": [
"6GK5763-1AL00-3DA0"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE WUM763-1 (6GK5763-1AL00-3DA0)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003cV2.0",
"product": {
"name": "SCALANCE WUM763-1 (6GK5763-1AL00-3AA0)",
"product_id": "CSAFPID-0007",
"product_identification_helper": {
"model_numbers": [
"6GK5763-1AL00-3AA0"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE WUM763-1 (6GK5763-1AL00-3AA0)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003cV2.0",
"product": {
"name": "SCALANCE WUM766-1 (EU) (6GK5766-1GE00-3DA0)",
"product_id": "CSAFPID-0008",
"product_identification_helper": {
"model_numbers": [
"6GK5766-1GE00-3DA0"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE WUM766-1 (EU) (6GK5766-1GE00-3DA0)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003cV2.0",
"product": {
"name": "SCALANCE WUM766-1 (US) (6GK5766-1GE00-3DB0)",
"product_id": "CSAFPID-0009",
"product_identification_helper": {
"model_numbers": [
"6GK5766-1GE00-3DB0"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE WUM766-1 (US) (6GK5766-1GE00-3DB0)"
}
],
"category": "vendor",
"name": "Siemens"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2018-12886",
"cwe": {
"id": "CWE-209",
"name": "Generation of Error Message Containing Sensitive Information"
},
"notes": [
{
"category": "summary",
"text": "stack_protect_prologue in cfgexpand.c and stack_protect_epilogue in function.c in GNU Compiler Collection (GCC) 4.1 through 8 (under certain circumstances) generate instruction sequences when targeting ARM targets that spill the address of the stack protector guard, which allows an attacker to bypass the protection of -fstack-protector, -fstack-protector-all, -fstack-protector-strong, and -fstack-protector-explicit against stack overflow by controlling what the stack canary is compared against.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0007",
"CSAFPID-0006",
"CSAFPID-0008",
"CSAFPID-0009"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V2.0 or later version",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0007",
"CSAFPID-0006",
"CSAFPID-0008",
"CSAFPID-0009"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109815650/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.1,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0007",
"CSAFPID-0006",
"CSAFPID-0008",
"CSAFPID-0009"
]
}
],
"title": "CVE-2018-12886"
},
{
"cve": "CVE-2018-25032",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"notes": [
{
"category": "summary",
"text": "zlib before 1.2.12 allows memory corruption when deflating (i.e., when compressing) if the input has many distant matches.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0007",
"CSAFPID-0006",
"CSAFPID-0008",
"CSAFPID-0009"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V2.0 or later version",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0007",
"CSAFPID-0006",
"CSAFPID-0008",
"CSAFPID-0009"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109815650/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0007",
"CSAFPID-0006",
"CSAFPID-0008",
"CSAFPID-0009"
]
}
],
"title": "CVE-2018-25032"
},
{
"cve": "CVE-2021-42373",
"cwe": {
"id": "CWE-476",
"name": "NULL Pointer Dereference"
},
"notes": [
{
"category": "summary",
"text": "A NULL pointer dereference in Busybox\u0027s man applet leads to denial of service when a section name is supplied but no page argument is given.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0007",
"CSAFPID-0006",
"CSAFPID-0008",
"CSAFPID-0009"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V2.0 or later version",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0007",
"CSAFPID-0006",
"CSAFPID-0008",
"CSAFPID-0009"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109815650/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.1,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0007",
"CSAFPID-0006",
"CSAFPID-0008",
"CSAFPID-0009"
]
}
],
"title": "CVE-2021-42373"
},
{
"cve": "CVE-2021-42374",
"cwe": {
"id": "CWE-125",
"name": "Out-of-bounds Read"
},
"notes": [
{
"category": "summary",
"text": "An out-of-bounds heap read in Busybox\u0027s unlzma applet leads to information leak and denial of service when crafted LZMA-compressed input is decompressed. This can be triggered by any applet/format that internally supports LZMA compression.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0007",
"CSAFPID-0006",
"CSAFPID-0008",
"CSAFPID-0009"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V2.0 or later version",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0007",
"CSAFPID-0006",
"CSAFPID-0008",
"CSAFPID-0009"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109815650/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0007",
"CSAFPID-0006",
"CSAFPID-0008",
"CSAFPID-0009"
]
}
],
"title": "CVE-2021-42374"
},
{
"cve": "CVE-2021-42375",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "summary",
"text": "An incorrect handling of a special element in Busybox\u0027s ash applet leads to denial of service when processing a crafted shell command, due to the shell mistaking specific characters for reserved characters. This may be used for DoS under rare conditions of filtered command input.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0007",
"CSAFPID-0006",
"CSAFPID-0008",
"CSAFPID-0009"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V2.0 or later version",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0007",
"CSAFPID-0006",
"CSAFPID-0008",
"CSAFPID-0009"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109815650/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.1,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0007",
"CSAFPID-0006",
"CSAFPID-0008",
"CSAFPID-0009"
]
}
],
"title": "CVE-2021-42375"
},
{
"cve": "CVE-2021-42376",
"cwe": {
"id": "CWE-476",
"name": "NULL Pointer Dereference"
},
"notes": [
{
"category": "summary",
"text": "A NULL pointer dereference in Busybox\u0027s hush applet leads to denial of service when processing a crafted shell command, due to missing validation after a \\x03 delimiter character. This may be used for DoS under very rare conditions of filtered command input.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0007",
"CSAFPID-0006",
"CSAFPID-0008",
"CSAFPID-0009"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V2.0 or later version",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0007",
"CSAFPID-0006",
"CSAFPID-0008",
"CSAFPID-0009"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109815650/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.1,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0007",
"CSAFPID-0006",
"CSAFPID-0008",
"CSAFPID-0009"
]
}
],
"title": "CVE-2021-42376"
},
{
"cve": "CVE-2021-42377",
"cwe": {
"id": "CWE-763",
"name": "Release of Invalid Pointer or Reference"
},
"notes": [
{
"category": "summary",
"text": "An attacker-controlled pointer free in Busybox\u0027s hush applet leads to denial of service and possible code execution when processing a crafted shell command, due to the shell mishandling the \u0026\u0026\u0026 string. This may be used for remote code execution under rare conditions of filtered command input.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0007",
"CSAFPID-0006",
"CSAFPID-0008",
"CSAFPID-0009"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V2.0 or later version",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0007",
"CSAFPID-0006",
"CSAFPID-0008",
"CSAFPID-0009"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109815650/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0007",
"CSAFPID-0006",
"CSAFPID-0008",
"CSAFPID-0009"
]
}
],
"title": "CVE-2021-42377"
},
{
"cve": "CVE-2021-42378",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"notes": [
{
"category": "summary",
"text": "A use-after-free in Busybox\u0027s awk applet leads to denial of service and possibly code execution when processing a crafted awk pattern in the getvar_i function.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0007",
"CSAFPID-0006",
"CSAFPID-0008",
"CSAFPID-0009"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V2.0 or later version",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0007",
"CSAFPID-0006",
"CSAFPID-0008",
"CSAFPID-0009"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109815650/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.6,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0007",
"CSAFPID-0006",
"CSAFPID-0008",
"CSAFPID-0009"
]
}
],
"title": "CVE-2021-42378"
},
{
"cve": "CVE-2021-42379",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"notes": [
{
"category": "summary",
"text": "A use-after-free in Busybox\u0027s awk applet leads to denial of service and possibly code execution when processing a crafted awk pattern in the next_input_file function.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0007",
"CSAFPID-0006",
"CSAFPID-0008",
"CSAFPID-0009"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V2.0 or later version",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0007",
"CSAFPID-0006",
"CSAFPID-0008",
"CSAFPID-0009"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109815650/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.6,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0007",
"CSAFPID-0006",
"CSAFPID-0008",
"CSAFPID-0009"
]
}
],
"title": "CVE-2021-42379"
},
{
"cve": "CVE-2021-42380",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"notes": [
{
"category": "summary",
"text": "A use-after-free in awk leads to denial of service and possibly code execution when processing a crafted awk pattern in the clrvar function.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0007",
"CSAFPID-0006",
"CSAFPID-0008",
"CSAFPID-0009"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V2.0 or later version",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0007",
"CSAFPID-0006",
"CSAFPID-0008",
"CSAFPID-0009"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109815650/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.6,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0007",
"CSAFPID-0006",
"CSAFPID-0008",
"CSAFPID-0009"
]
}
],
"title": "CVE-2021-42380"
},
{
"cve": "CVE-2021-42381",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"notes": [
{
"category": "summary",
"text": "A use-after-free in awk leads to denial of service and possibly code execution when processing a crafted awk pattern in the hash_init function.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0007",
"CSAFPID-0006",
"CSAFPID-0008",
"CSAFPID-0009"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V2.0 or later version",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0007",
"CSAFPID-0006",
"CSAFPID-0008",
"CSAFPID-0009"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109815650/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.6,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0007",
"CSAFPID-0006",
"CSAFPID-0008",
"CSAFPID-0009"
]
}
],
"title": "CVE-2021-42381"
},
{
"cve": "CVE-2021-42382",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"notes": [
{
"category": "summary",
"text": "A use-after-free in awk leads to denial of service and possibly code execution when processing a crafted awk pattern in the getvar_s function.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0007",
"CSAFPID-0006",
"CSAFPID-0008",
"CSAFPID-0009"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V2.0 or later version",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0007",
"CSAFPID-0006",
"CSAFPID-0008",
"CSAFPID-0009"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109815650/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.6,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0007",
"CSAFPID-0006",
"CSAFPID-0008",
"CSAFPID-0009"
]
}
],
"title": "CVE-2021-42382"
},
{
"cve": "CVE-2021-42383",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"notes": [
{
"category": "summary",
"text": "A use-after-free in awk leads to denial of service and possibly code execution when processing a crafted awk pattern in the evaluate function.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0007",
"CSAFPID-0006",
"CSAFPID-0008",
"CSAFPID-0009"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V2.0 or later version",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0007",
"CSAFPID-0006",
"CSAFPID-0008",
"CSAFPID-0009"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109815650/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.6,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0007",
"CSAFPID-0006",
"CSAFPID-0008",
"CSAFPID-0009"
]
}
],
"title": "CVE-2021-42383"
},
{
"cve": "CVE-2021-42384",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"notes": [
{
"category": "summary",
"text": "A use-after-free in Busybox\u0027s awk applet leads to denial of service and possibly code execution when processing a crafted awk pattern in the handle_special function.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0007",
"CSAFPID-0006",
"CSAFPID-0008",
"CSAFPID-0009"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V2.0 or later version",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0007",
"CSAFPID-0006",
"CSAFPID-0008",
"CSAFPID-0009"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109815650/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.6,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0007",
"CSAFPID-0006",
"CSAFPID-0008",
"CSAFPID-0009"
]
}
],
"title": "CVE-2021-42384"
},
{
"cve": "CVE-2021-42385",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"notes": [
{
"category": "summary",
"text": "A use-after-free in awk leads to denial of service and possibly code execution when processing a crafted awk pattern in the evaluate function.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0007",
"CSAFPID-0006",
"CSAFPID-0008",
"CSAFPID-0009"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V2.0 or later version",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0007",
"CSAFPID-0006",
"CSAFPID-0008",
"CSAFPID-0009"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109815650/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.6,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0007",
"CSAFPID-0006",
"CSAFPID-0008",
"CSAFPID-0009"
]
}
],
"title": "CVE-2021-42385"
},
{
"cve": "CVE-2021-42386",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"notes": [
{
"category": "summary",
"text": "A use-after-free in awk leads to denial of service and possibly code execution when processing a crafted awk pattern in the nvalloc function.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0007",
"CSAFPID-0006",
"CSAFPID-0008",
"CSAFPID-0009"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V2.0 or later version",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0007",
"CSAFPID-0006",
"CSAFPID-0008",
"CSAFPID-0009"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109815650/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.6,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0007",
"CSAFPID-0006",
"CSAFPID-0008",
"CSAFPID-0009"
]
}
],
"title": "CVE-2021-42386"
},
{
"cve": "CVE-2022-23395",
"cwe": {
"id": "CWE-1321",
"name": "Improperly Controlled Modification of Object Prototype Attributes (\u0027Prototype Pollution\u0027)"
},
"notes": [
{
"category": "summary",
"text": "jQuery Cookie 1.4.1 is affected by prototype pollution, which can lead to DOM cross-site scripting (XSS).",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0007",
"CSAFPID-0006",
"CSAFPID-0008",
"CSAFPID-0009"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V2.0 or later version",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0007",
"CSAFPID-0006",
"CSAFPID-0008",
"CSAFPID-0009"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109815650/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0007",
"CSAFPID-0006",
"CSAFPID-0008",
"CSAFPID-0009"
]
}
],
"title": "CVE-2022-23395"
}
]
}
ICSA-23-075-01
Vulnerability from csaf_cisa - Published: 2023-03-14 00:00 - Updated: 2023-03-14 00:00Notes
{
"document": {
"acknowledgments": [
{
"organization": "Siemens ProductCERT",
"summary": "reporting these vulnerabilities to CISA."
}
],
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Disclosure is not limited",
"tlp": {
"label": "WHITE",
"url": "https://us-cert.cisa.gov/tlp/"
}
},
"notes": [
{
"category": "summary",
"text": "Multiple third-party component vulnerabilities were reported for the Busybox applet, the Linux Kernel, OpenSSL, OpenVPN and various other components used by the RUGGEDCOM and SCALANCE products. The vulnerabilities range from improper neutralization of special elements to improper handling of commands under certain circumstances, that could lead to code injection and denial of service.\n\nSiemens has released updates for the affected products and recommends to update to the latest versions.",
"title": "Summary"
},
{
"category": "general",
"text": "As a general security measure, Siemens strongly recommends to protect network access to devices with appropriate mechanisms. In order to operate the devices in a protected IT environment, Siemens recommends to configure the environment according to Siemens\u0027 operational guidelines for Industrial Security (Download: \nhttps://www.siemens.com/cert/operational-guidelines-industrial-security), and to follow the recommendations in the product manuals.\nAdditional information on Industrial Security by Siemens can be found at: https://www.siemens.com/industrialsecurity",
"title": "General Recommendations"
},
{
"category": "general",
"text": "For further inquiries on security vulnerabilities in Siemens products and solutions, please contact the Siemens ProductCERT: https://www.siemens.com/cert/advisories",
"title": "Additional Resources"
},
{
"category": "legal_disclaimer",
"text": "Siemens Security Advisories are subject to the terms and conditions contained in Siemens\u0027 underlying license terms or other applicable agreements previously agreed to with Siemens (hereinafter \"License Terms\"). To the extent applicable to information, software or documentation made available in or through a Siemens Security Advisory, the Terms of Use of Siemens\u0027 Global Website (https://www.siemens.com/terms_of_use, hereinafter \"Terms of Use\"), in particular Sections 8-10 of the Terms of Use, shall apply additionally. In case of conflicts, the License Terms shall prevail over the Terms of Use.",
"title": "Terms of Use"
},
{
"category": "legal_disclaimer",
"text": "All information products included in https://us-cert.cisa.gov/ics are provided \"as is\" for informational purposes only. The Department of Homeland Security (DHS) does not provide any warranties of any kind regarding any information contained within. DHS does not endorse any commercial product or service, referenced in this product or otherwise. Further dissemination of this product is governed by the Traffic Light Protocol (TLP) marking in the header. For more information about TLP, see https://us-cert.cisa.gov/tlp/.",
"title": "Legal Notice"
},
{
"category": "other",
"text": "This CISA CSAF advisory was converted from Siemens ProductCERT\u0027s CSAF advisory.",
"title": "Advisory Conversion Disclaimer"
},
{
"category": "other",
"text": "Multiple",
"title": "Critical infrastructure sectors"
},
{
"category": "other",
"text": "Worldwide",
"title": "Countries/areas deployed"
},
{
"category": "other",
"text": "Germany",
"title": "Company headquarters location"
},
{
"category": "general",
"text": "CISA recommends users take defensive measures to minimize the exploitation risk of this vulnerability.",
"title": "Recommended Practices"
},
{
"category": "general",
"text": "Minimize network exposure for all control system devices and/or systems, and ensure they are not accessible from the internet.",
"title": "Recommended Practices"
},
{
"category": "general",
"text": "Locate control system networks and remote devices behind firewalls and isolate them from business networks.",
"title": "Recommended Practices"
},
{
"category": "general",
"text": "When remote access is required, use more secure methods, such as Virtual Private Networks (VPNs), recognizing VPNs may have vulnerabilities and should be updated to the most recent version available. Also recognize VPN is only as secure as its connected devices.",
"title": "Recommended Practices"
},
{
"category": "general",
"text": "CISA reminds organizations to perform proper impact analysis and risk assessment prior to deploying defensive measures.",
"title": "Recommended Practices"
},
{
"category": "general",
"text": "CISA also provides a section for control systems security recommended practices on the ICS webpage on cisa.gov. Several CISA products detailing cyber defense best practices are available for reading and download, including Improving Industrial Control Systems Cybersecurity with Defense-in-Depth Strategies.",
"title": "Recommended Practices"
},
{
"category": "general",
"text": "CISA encourages organizations to implement recommended cybersecurity strategies for proactive defense of ICS assets. Additional mitigation guidance and recommended practices are publicly available on the ICS webpage at cisa.gov in the technical information paper, ICS-TIP-12-146-01B--Targeted Cyber Intrusion Detection and Mitigation Strategies.",
"title": "Recommended Practices"
},
{
"category": "general",
"text": "Organizations observing suspected malicious activity should follow established internal procedures and report findings to CISA for tracking and correlation against other incidents.",
"title": "Recommended Practices"
}
],
"publisher": {
"category": "other",
"contact_details": "central@cisa.dhs.gov",
"name": "CISA",
"namespace": "https://www.cisa.gov/"
},
"references": [
{
"category": "self",
"summary": "SSA-419740: Multiple\tThird-Party Component Vulnerabilities in RUGGEDCOM and SCALANCE Products before V7.2 - CSAF Version",
"url": "https://cert-portal.siemens.com/productcert/csaf/ssa-419740.json"
},
{
"category": "self",
"summary": "SSA-419740: Multiple\tThird-Party Component Vulnerabilities in RUGGEDCOM and SCALANCE Products before V7.2 - TXT Version",
"url": "https://cert-portal.siemens.com/productcert/txt/ssa-419740.txt"
},
{
"category": "self",
"summary": "SSA-419740: Multiple\tThird-Party Component Vulnerabilities in RUGGEDCOM and SCALANCE Products before V7.2 - PDF Version",
"url": "https://cert-portal.siemens.com/productcert/pdf/ssa-419740.pdf"
},
{
"category": "self",
"summary": "ICS Advisory ICSA-23-075-01 JSON",
"url": "https://raw.githubusercontent.com/cisagov/CSAF/develop/csaf_files/OT/white/2023/icsa-23-075-01.json"
},
{
"category": "self",
"summary": "ICS Advisory ICSA-23-075-01 - Web Version",
"url": "https://www.cisa.gov/news-events/ics-advisories/icsa-23-075-01"
},
{
"category": "external",
"summary": "Recommended Practices",
"url": "https://www.cisa.gov/uscert/ics/alerts/ICS-ALERT-10-301-01"
},
{
"category": "external",
"summary": "Recommended Practices",
"url": "https://www.cisa.gov/resources-tools/resources/ics-recommended-practices"
},
{
"category": "external",
"summary": "Recommended Practices",
"url": "https://www.cisa.gov/topics/industrial-control-systems"
},
{
"category": "external",
"summary": "Recommended Practices",
"url": "https://us-cert.cisa.gov/sites/default/files/recommended_practices/NCCIC_ICS-CERT_Defense_in_Depth_2016_S508C.pdf"
},
{
"category": "external",
"summary": "Recommended Practices",
"url": "https://www.cisa.gov/sites/default/files/publications/Cybersecurity_Best_Practices_for_Industrial_Control_Systems.pdf"
},
{
"category": "external",
"summary": "Recommended Practices",
"url": "https://www.cisa.gov/uscert/ics/tips/ICS-TIP-12-146-01B"
}
],
"title": "Siemens SCALANCE, RUGGEDCOM Third-Party",
"tracking": {
"current_release_date": "2023-03-14T00:00:00.000000Z",
"generator": {
"engine": {
"name": "CISA CSAF Generator",
"version": "1.0.0"
}
},
"id": "ICSA-23-075-01",
"initial_release_date": "2023-03-14T00:00:00.000000Z",
"revision_history": [
{
"date": "2023-03-14T00:00:00.000000Z",
"legacy_version": "1.0",
"number": "1",
"summary": "Publication Date"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version_range",
"name": "\u003cV7.2",
"product": {
"name": "RUGGEDCOM RM1224 LTE(4G) EU (6GK6108-4AM00-2BA2)",
"product_id": "CSAFPID-0001",
"product_identification_helper": {
"model_numbers": [
"6GK6108-4AM00-2BA2"
]
}
}
}
],
"category": "product_name",
"name": "RUGGEDCOM RM1224 LTE(4G) EU (6GK6108-4AM00-2BA2)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003cV7.2",
"product": {
"name": "RUGGEDCOM RM1224 LTE(4G) NAM (6GK6108-4AM00-2DA2)",
"product_id": "CSAFPID-0002",
"product_identification_helper": {
"model_numbers": [
"6GK6108-4AM00-2DA2"
]
}
}
}
],
"category": "product_name",
"name": "RUGGEDCOM RM1224 LTE(4G) NAM (6GK6108-4AM00-2DA2)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003cV7.2",
"product": {
"name": "SCALANCE M804PB (6GK5804-0AP00-2AA2)",
"product_id": "CSAFPID-0003",
"product_identification_helper": {
"model_numbers": [
"6GK5804-0AP00-2AA2"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE M804PB (6GK5804-0AP00-2AA2)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003cV7.2",
"product": {
"name": "SCALANCE M812-1 ADSL-Router (Annex A) (6GK5812-1AA00-2AA2)",
"product_id": "CSAFPID-0004",
"product_identification_helper": {
"model_numbers": [
"6GK5812-1AA00-2AA2"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE M812-1 ADSL-Router (Annex A) (6GK5812-1AA00-2AA2)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003cV7.2",
"product": {
"name": "SCALANCE M812-1 ADSL-Router (Annex B) (6GK5812-1BA00-2AA2)",
"product_id": "CSAFPID-0005",
"product_identification_helper": {
"model_numbers": [
"6GK5812-1BA00-2AA2"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE M812-1 ADSL-Router (Annex B) (6GK5812-1BA00-2AA2)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003cV7.2",
"product": {
"name": "SCALANCE M816-1 ADSL-Router (Annex A) (6GK5816-1AA00-2AA2)",
"product_id": "CSAFPID-0006",
"product_identification_helper": {
"model_numbers": [
"6GK5816-1AA00-2AA2"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE M816-1 ADSL-Router (Annex A) (6GK5816-1AA00-2AA2)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003cV7.2",
"product": {
"name": "SCALANCE M816-1 ADSL-Router (Annex B) (6GK5816-1BA00-2AA2)",
"product_id": "CSAFPID-0007",
"product_identification_helper": {
"model_numbers": [
"6GK5816-1BA00-2AA2"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE M816-1 ADSL-Router (Annex B) (6GK5816-1BA00-2AA2)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003cV7.2",
"product": {
"name": "SCALANCE M826-2 SHDSL-Router (6GK5826-2AB00-2AB2)",
"product_id": "CSAFPID-0008",
"product_identification_helper": {
"model_numbers": [
"6GK5826-2AB00-2AB2"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE M826-2 SHDSL-Router (6GK5826-2AB00-2AB2)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003cV7.2",
"product": {
"name": "SCALANCE M874-2 (6GK5874-2AA00-2AA2)",
"product_id": "CSAFPID-0009",
"product_identification_helper": {
"model_numbers": [
"6GK5874-2AA00-2AA2"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE M874-2 (6GK5874-2AA00-2AA2)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003cV7.2",
"product": {
"name": "SCALANCE M874-3 (6GK5874-3AA00-2AA2)",
"product_id": "CSAFPID-0010",
"product_identification_helper": {
"model_numbers": [
"6GK5874-3AA00-2AA2"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE M874-3 (6GK5874-3AA00-2AA2)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003cV7.2",
"product": {
"name": "SCALANCE M876-3 (EVDO) (6GK5876-3AA02-2BA2)",
"product_id": "CSAFPID-0011",
"product_identification_helper": {
"model_numbers": [
"6GK5876-3AA02-2BA2"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE M876-3 (EVDO) (6GK5876-3AA02-2BA2)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003cV7.2",
"product": {
"name": "SCALANCE M876-3 (ROK) (6GK5876-3AA02-2EA2)",
"product_id": "CSAFPID-0012",
"product_identification_helper": {
"model_numbers": [
"6GK5876-3AA02-2EA2"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE M876-3 (ROK) (6GK5876-3AA02-2EA2)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003cV7.2",
"product": {
"name": "SCALANCE M876-4 (6GK5876-4AA10-2BA2)",
"product_id": "CSAFPID-0013",
"product_identification_helper": {
"model_numbers": [
"6GK5876-4AA10-2BA2"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE M876-4 (6GK5876-4AA10-2BA2)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003cV7.2",
"product": {
"name": "SCALANCE M876-4 (EU) (6GK5876-4AA00-2BA2)",
"product_id": "CSAFPID-0014",
"product_identification_helper": {
"model_numbers": [
"6GK5876-4AA00-2BA2"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE M876-4 (EU) (6GK5876-4AA00-2BA2)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003cV7.2",
"product": {
"name": "SCALANCE M876-4 (NAM) (6GK5876-4AA00-2DA2)",
"product_id": "CSAFPID-0015",
"product_identification_helper": {
"model_numbers": [
"6GK5876-4AA00-2DA2"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE M876-4 (NAM) (6GK5876-4AA00-2DA2)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003cV7.2",
"product": {
"name": "SCALANCE MUM853-1 (EU) (6GK5853-2EA00-2DA1)",
"product_id": "CSAFPID-0016",
"product_identification_helper": {
"model_numbers": [
"6GK5853-2EA00-2DA1"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE MUM853-1 (EU) (6GK5853-2EA00-2DA1)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003cV7.2",
"product": {
"name": "SCALANCE MUM856-1 (EU) (6GK5856-2EA00-3DA1)",
"product_id": "CSAFPID-0017",
"product_identification_helper": {
"model_numbers": [
"6GK5856-2EA00-3DA1"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE MUM856-1 (EU) (6GK5856-2EA00-3DA1)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003cV7.2",
"product": {
"name": "SCALANCE MUM856-1 (RoW) (6GK5856-2EA00-3AA1)",
"product_id": "CSAFPID-0018",
"product_identification_helper": {
"model_numbers": [
"6GK5856-2EA00-3AA1"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE MUM856-1 (RoW) (6GK5856-2EA00-3AA1)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003cV7.2",
"product": {
"name": "SCALANCE S615 (6GK5615-0AA00-2AA2)",
"product_id": "CSAFPID-0019",
"product_identification_helper": {
"model_numbers": [
"6GK5615-0AA00-2AA2"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE S615 (6GK5615-0AA00-2AA2)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003cV7.2",
"product": {
"name": "SCALANCE S615 EEC (6GK5615-0AA01-2AA2)",
"product_id": "CSAFPID-0020",
"product_identification_helper": {
"model_numbers": [
"6GK5615-0AA01-2AA2"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE S615 EEC (6GK5615-0AA01-2AA2)"
}
],
"category": "vendor",
"name": "Siemens"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2018-25032",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"notes": [
{
"category": "summary",
"text": "zlib before 1.2.12 allows memory corruption when deflating (i.e., when compressing) if the input has many distant matches.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008",
"CSAFPID-0009",
"CSAFPID-0010",
"CSAFPID-0011",
"CSAFPID-0012",
"CSAFPID-0013",
"CSAFPID-0014",
"CSAFPID-0015",
"CSAFPID-0016",
"CSAFPID-0017",
"CSAFPID-0018",
"CSAFPID-0019",
"CSAFPID-0020"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V7.2 or later version",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008",
"CSAFPID-0009",
"CSAFPID-0010",
"CSAFPID-0011",
"CSAFPID-0012",
"CSAFPID-0013",
"CSAFPID-0014",
"CSAFPID-0015",
"CSAFPID-0016",
"CSAFPID-0017",
"CSAFPID-0018",
"CSAFPID-0019",
"CSAFPID-0020"
],
"url": "https://support.industry.siemens.com/cs/document/109817007/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008",
"CSAFPID-0009",
"CSAFPID-0010",
"CSAFPID-0011",
"CSAFPID-0012",
"CSAFPID-0013",
"CSAFPID-0014",
"CSAFPID-0015",
"CSAFPID-0016",
"CSAFPID-0017",
"CSAFPID-0018",
"CSAFPID-0019",
"CSAFPID-0020"
]
}
],
"title": "CVE-2018-25032"
},
{
"cve": "CVE-2019-1125",
"cwe": {
"id": "CWE-200",
"name": "Exposure of Sensitive Information to an Unauthorized Actor"
},
"notes": [
{
"category": "summary",
"text": "An information disclosure vulnerability exists when certain central processing units (CPU) speculatively access memory, aka \u0027Windows Kernel Information Disclosure Vulnerability\u0027. This CVE ID is unique from CVE-2019-1071, CVE-2019-1073.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008",
"CSAFPID-0009",
"CSAFPID-0010",
"CSAFPID-0011",
"CSAFPID-0012",
"CSAFPID-0013",
"CSAFPID-0014",
"CSAFPID-0015",
"CSAFPID-0016",
"CSAFPID-0017",
"CSAFPID-0018",
"CSAFPID-0019",
"CSAFPID-0020"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V7.2 or later version",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008",
"CSAFPID-0009",
"CSAFPID-0010",
"CSAFPID-0011",
"CSAFPID-0012",
"CSAFPID-0013",
"CSAFPID-0014",
"CSAFPID-0015",
"CSAFPID-0016",
"CSAFPID-0017",
"CSAFPID-0018",
"CSAFPID-0019",
"CSAFPID-0020"
],
"url": "https://support.industry.siemens.com/cs/document/109817007/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008",
"CSAFPID-0009",
"CSAFPID-0010",
"CSAFPID-0011",
"CSAFPID-0012",
"CSAFPID-0013",
"CSAFPID-0014",
"CSAFPID-0015",
"CSAFPID-0016",
"CSAFPID-0017",
"CSAFPID-0018",
"CSAFPID-0019",
"CSAFPID-0020"
]
}
],
"title": "CVE-2019-1125"
},
{
"cve": "CVE-2021-4034",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"notes": [
{
"category": "summary",
"text": "A local privilege escalation vulnerability was found on polkit\u0027s pkexec utility. The pkexec application is a setuid tool designed to allow unprivileged users to run commands as privileged users according predefined policies. The current version of pkexec doesn\u0027t handle the calling parameters count correctly and ends trying to execute environment variables as commands. An attacker can leverage this by crafting environment variables in such a way it\u0027ll induce pkexec to execute arbitrary code. When successfully executed the attack can cause a local privilege escalation given unprivileged users administrative rights on the target machine.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008",
"CSAFPID-0009",
"CSAFPID-0010",
"CSAFPID-0011",
"CSAFPID-0012",
"CSAFPID-0013",
"CSAFPID-0014",
"CSAFPID-0015",
"CSAFPID-0016",
"CSAFPID-0017",
"CSAFPID-0018",
"CSAFPID-0019",
"CSAFPID-0020"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V7.2 or later version",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008",
"CSAFPID-0009",
"CSAFPID-0010",
"CSAFPID-0011",
"CSAFPID-0012",
"CSAFPID-0013",
"CSAFPID-0014",
"CSAFPID-0015",
"CSAFPID-0016",
"CSAFPID-0017",
"CSAFPID-0018",
"CSAFPID-0019",
"CSAFPID-0020"
],
"url": "https://support.industry.siemens.com/cs/document/109817007/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:U/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008",
"CSAFPID-0009",
"CSAFPID-0010",
"CSAFPID-0011",
"CSAFPID-0012",
"CSAFPID-0013",
"CSAFPID-0014",
"CSAFPID-0015",
"CSAFPID-0016",
"CSAFPID-0017",
"CSAFPID-0018",
"CSAFPID-0019",
"CSAFPID-0020"
]
}
],
"title": "CVE-2021-4034"
},
{
"cve": "CVE-2021-4149",
"cwe": {
"id": "CWE-667",
"name": "Improper Locking"
},
"notes": [
{
"category": "summary",
"text": "A vulnerability was found in btrfs_alloc_tree_b in fs/btrfs/extent-tree.c in the Linux kernel due to an improper lock operation in btrfs. In this flaw, a user with a local privilege may cause a denial of service (DOS) due to a deadlock problem.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008",
"CSAFPID-0009",
"CSAFPID-0010",
"CSAFPID-0011",
"CSAFPID-0012",
"CSAFPID-0013",
"CSAFPID-0014",
"CSAFPID-0015",
"CSAFPID-0016",
"CSAFPID-0017",
"CSAFPID-0018",
"CSAFPID-0019",
"CSAFPID-0020"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V7.2 or later version",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008",
"CSAFPID-0009",
"CSAFPID-0010",
"CSAFPID-0011",
"CSAFPID-0012",
"CSAFPID-0013",
"CSAFPID-0014",
"CSAFPID-0015",
"CSAFPID-0016",
"CSAFPID-0017",
"CSAFPID-0018",
"CSAFPID-0019",
"CSAFPID-0020"
],
"url": "https://support.industry.siemens.com/cs/document/109817007/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008",
"CSAFPID-0009",
"CSAFPID-0010",
"CSAFPID-0011",
"CSAFPID-0012",
"CSAFPID-0013",
"CSAFPID-0014",
"CSAFPID-0015",
"CSAFPID-0016",
"CSAFPID-0017",
"CSAFPID-0018",
"CSAFPID-0019",
"CSAFPID-0020"
]
}
],
"title": "CVE-2021-4149"
},
{
"cve": "CVE-2021-26401",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "summary",
"text": "LFENCE/JMP (mitigation V2-2) may not sufficiently mitigate CVE-2017-5715 on some AMD CPUs.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008",
"CSAFPID-0009",
"CSAFPID-0010",
"CSAFPID-0011",
"CSAFPID-0012",
"CSAFPID-0013",
"CSAFPID-0014",
"CSAFPID-0015",
"CSAFPID-0016",
"CSAFPID-0017",
"CSAFPID-0018",
"CSAFPID-0019",
"CSAFPID-0020"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V7.2 or later version",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008",
"CSAFPID-0009",
"CSAFPID-0010",
"CSAFPID-0011",
"CSAFPID-0012",
"CSAFPID-0013",
"CSAFPID-0014",
"CSAFPID-0015",
"CSAFPID-0016",
"CSAFPID-0017",
"CSAFPID-0018",
"CSAFPID-0019",
"CSAFPID-0020"
],
"url": "https://support.industry.siemens.com/cs/document/109817007/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.6,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008",
"CSAFPID-0009",
"CSAFPID-0010",
"CSAFPID-0011",
"CSAFPID-0012",
"CSAFPID-0013",
"CSAFPID-0014",
"CSAFPID-0015",
"CSAFPID-0016",
"CSAFPID-0017",
"CSAFPID-0018",
"CSAFPID-0019",
"CSAFPID-0020"
]
}
],
"title": "CVE-2021-26401"
},
{
"cve": "CVE-2021-42373",
"cwe": {
"id": "CWE-476",
"name": "NULL Pointer Dereference"
},
"notes": [
{
"category": "summary",
"text": "A NULL pointer dereference in Busybox\u0027s man applet leads to denial of service when a section name is supplied but no page argument is given.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008",
"CSAFPID-0009",
"CSAFPID-0010",
"CSAFPID-0011",
"CSAFPID-0012",
"CSAFPID-0013",
"CSAFPID-0014",
"CSAFPID-0015",
"CSAFPID-0016",
"CSAFPID-0017",
"CSAFPID-0018",
"CSAFPID-0019",
"CSAFPID-0020"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V7.2 or later version",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008",
"CSAFPID-0009",
"CSAFPID-0010",
"CSAFPID-0011",
"CSAFPID-0012",
"CSAFPID-0013",
"CSAFPID-0014",
"CSAFPID-0015",
"CSAFPID-0016",
"CSAFPID-0017",
"CSAFPID-0018",
"CSAFPID-0019",
"CSAFPID-0020"
],
"url": "https://support.industry.siemens.com/cs/document/109817007/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.1,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008",
"CSAFPID-0009",
"CSAFPID-0010",
"CSAFPID-0011",
"CSAFPID-0012",
"CSAFPID-0013",
"CSAFPID-0014",
"CSAFPID-0015",
"CSAFPID-0016",
"CSAFPID-0017",
"CSAFPID-0018",
"CSAFPID-0019",
"CSAFPID-0020"
]
}
],
"title": "CVE-2021-42373"
},
{
"cve": "CVE-2021-42374",
"cwe": {
"id": "CWE-125",
"name": "Out-of-bounds Read"
},
"notes": [
{
"category": "summary",
"text": "An out-of-bounds heap read in Busybox\u0027s unlzma applet leads to information leak and denial of service when crafted LZMA-compressed input is decompressed. This can be triggered by any applet/format that internally supports LZMA compression.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008",
"CSAFPID-0009",
"CSAFPID-0010",
"CSAFPID-0011",
"CSAFPID-0012",
"CSAFPID-0013",
"CSAFPID-0014",
"CSAFPID-0015",
"CSAFPID-0016",
"CSAFPID-0017",
"CSAFPID-0018",
"CSAFPID-0019",
"CSAFPID-0020"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V7.2 or later version",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008",
"CSAFPID-0009",
"CSAFPID-0010",
"CSAFPID-0011",
"CSAFPID-0012",
"CSAFPID-0013",
"CSAFPID-0014",
"CSAFPID-0015",
"CSAFPID-0016",
"CSAFPID-0017",
"CSAFPID-0018",
"CSAFPID-0019",
"CSAFPID-0020"
],
"url": "https://support.industry.siemens.com/cs/document/109817007/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008",
"CSAFPID-0009",
"CSAFPID-0010",
"CSAFPID-0011",
"CSAFPID-0012",
"CSAFPID-0013",
"CSAFPID-0014",
"CSAFPID-0015",
"CSAFPID-0016",
"CSAFPID-0017",
"CSAFPID-0018",
"CSAFPID-0019",
"CSAFPID-0020"
]
}
],
"title": "CVE-2021-42374"
},
{
"cve": "CVE-2021-42375",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "summary",
"text": "An incorrect handling of a special element in Busybox\u0027s ash applet leads to denial of service when processing a crafted shell command, due to the shell mistaking specific characters for reserved characters. This may be used for DoS under rare conditions of filtered command input.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008",
"CSAFPID-0009",
"CSAFPID-0010",
"CSAFPID-0011",
"CSAFPID-0012",
"CSAFPID-0013",
"CSAFPID-0014",
"CSAFPID-0015",
"CSAFPID-0016",
"CSAFPID-0017",
"CSAFPID-0018",
"CSAFPID-0019",
"CSAFPID-0020"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V7.2 or later version",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008",
"CSAFPID-0009",
"CSAFPID-0010",
"CSAFPID-0011",
"CSAFPID-0012",
"CSAFPID-0013",
"CSAFPID-0014",
"CSAFPID-0015",
"CSAFPID-0016",
"CSAFPID-0017",
"CSAFPID-0018",
"CSAFPID-0019",
"CSAFPID-0020"
],
"url": "https://support.industry.siemens.com/cs/document/109817007/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.1,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008",
"CSAFPID-0009",
"CSAFPID-0010",
"CSAFPID-0011",
"CSAFPID-0012",
"CSAFPID-0013",
"CSAFPID-0014",
"CSAFPID-0015",
"CSAFPID-0016",
"CSAFPID-0017",
"CSAFPID-0018",
"CSAFPID-0019",
"CSAFPID-0020"
]
}
],
"title": "CVE-2021-42375"
},
{
"cve": "CVE-2021-42376",
"cwe": {
"id": "CWE-476",
"name": "NULL Pointer Dereference"
},
"notes": [
{
"category": "summary",
"text": "A NULL pointer dereference in Busybox\u0027s hush applet leads to denial of service when processing a crafted shell command, due to missing validation after a \\x03 delimiter character. This may be used for DoS under very rare conditions of filtered command input.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008",
"CSAFPID-0009",
"CSAFPID-0010",
"CSAFPID-0011",
"CSAFPID-0012",
"CSAFPID-0013",
"CSAFPID-0014",
"CSAFPID-0015",
"CSAFPID-0016",
"CSAFPID-0017",
"CSAFPID-0018",
"CSAFPID-0019",
"CSAFPID-0020"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V7.2 or later version",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008",
"CSAFPID-0009",
"CSAFPID-0010",
"CSAFPID-0011",
"CSAFPID-0012",
"CSAFPID-0013",
"CSAFPID-0014",
"CSAFPID-0015",
"CSAFPID-0016",
"CSAFPID-0017",
"CSAFPID-0018",
"CSAFPID-0019",
"CSAFPID-0020"
],
"url": "https://support.industry.siemens.com/cs/document/109817007/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.1,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008",
"CSAFPID-0009",
"CSAFPID-0010",
"CSAFPID-0011",
"CSAFPID-0012",
"CSAFPID-0013",
"CSAFPID-0014",
"CSAFPID-0015",
"CSAFPID-0016",
"CSAFPID-0017",
"CSAFPID-0018",
"CSAFPID-0019",
"CSAFPID-0020"
]
}
],
"title": "CVE-2021-42376"
},
{
"cve": "CVE-2021-42377",
"cwe": {
"id": "CWE-763",
"name": "Release of Invalid Pointer or Reference"
},
"notes": [
{
"category": "summary",
"text": "An attacker-controlled pointer free in Busybox\u0027s hush applet leads to denial of service and possible code execution when processing a crafted shell command, due to the shell mishandling the \u0026\u0026\u0026 string. This may be used for remote code execution under rare conditions of filtered command input.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008",
"CSAFPID-0009",
"CSAFPID-0010",
"CSAFPID-0011",
"CSAFPID-0012",
"CSAFPID-0013",
"CSAFPID-0014",
"CSAFPID-0015",
"CSAFPID-0016",
"CSAFPID-0017",
"CSAFPID-0018",
"CSAFPID-0019",
"CSAFPID-0020"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V7.2 or later version",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008",
"CSAFPID-0009",
"CSAFPID-0010",
"CSAFPID-0011",
"CSAFPID-0012",
"CSAFPID-0013",
"CSAFPID-0014",
"CSAFPID-0015",
"CSAFPID-0016",
"CSAFPID-0017",
"CSAFPID-0018",
"CSAFPID-0019",
"CSAFPID-0020"
],
"url": "https://support.industry.siemens.com/cs/document/109817007/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008",
"CSAFPID-0009",
"CSAFPID-0010",
"CSAFPID-0011",
"CSAFPID-0012",
"CSAFPID-0013",
"CSAFPID-0014",
"CSAFPID-0015",
"CSAFPID-0016",
"CSAFPID-0017",
"CSAFPID-0018",
"CSAFPID-0019",
"CSAFPID-0020"
]
}
],
"title": "CVE-2021-42377"
},
{
"cve": "CVE-2021-42378",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"notes": [
{
"category": "summary",
"text": "A use-after-free in Busybox\u0027s awk applet leads to denial of service and possibly code execution when processing a crafted awk pattern in the getvar_i function.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008",
"CSAFPID-0009",
"CSAFPID-0010",
"CSAFPID-0011",
"CSAFPID-0012",
"CSAFPID-0013",
"CSAFPID-0014",
"CSAFPID-0015",
"CSAFPID-0016",
"CSAFPID-0017",
"CSAFPID-0018",
"CSAFPID-0019",
"CSAFPID-0020"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V7.2 or later version",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008",
"CSAFPID-0009",
"CSAFPID-0010",
"CSAFPID-0011",
"CSAFPID-0012",
"CSAFPID-0013",
"CSAFPID-0014",
"CSAFPID-0015",
"CSAFPID-0016",
"CSAFPID-0017",
"CSAFPID-0018",
"CSAFPID-0019",
"CSAFPID-0020"
],
"url": "https://support.industry.siemens.com/cs/document/109817007/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.6,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008",
"CSAFPID-0009",
"CSAFPID-0010",
"CSAFPID-0011",
"CSAFPID-0012",
"CSAFPID-0013",
"CSAFPID-0014",
"CSAFPID-0015",
"CSAFPID-0016",
"CSAFPID-0017",
"CSAFPID-0018",
"CSAFPID-0019",
"CSAFPID-0020"
]
}
],
"title": "CVE-2021-42378"
},
{
"cve": "CVE-2021-42379",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"notes": [
{
"category": "summary",
"text": "A use-after-free in Busybox\u0027s awk applet leads to denial of service and possibly code execution when processing a crafted awk pattern in the next_input_file function.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008",
"CSAFPID-0009",
"CSAFPID-0010",
"CSAFPID-0011",
"CSAFPID-0012",
"CSAFPID-0013",
"CSAFPID-0014",
"CSAFPID-0015",
"CSAFPID-0016",
"CSAFPID-0017",
"CSAFPID-0018",
"CSAFPID-0019",
"CSAFPID-0020"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V7.2 or later version",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008",
"CSAFPID-0009",
"CSAFPID-0010",
"CSAFPID-0011",
"CSAFPID-0012",
"CSAFPID-0013",
"CSAFPID-0014",
"CSAFPID-0015",
"CSAFPID-0016",
"CSAFPID-0017",
"CSAFPID-0018",
"CSAFPID-0019",
"CSAFPID-0020"
],
"url": "https://support.industry.siemens.com/cs/document/109817007/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.6,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008",
"CSAFPID-0009",
"CSAFPID-0010",
"CSAFPID-0011",
"CSAFPID-0012",
"CSAFPID-0013",
"CSAFPID-0014",
"CSAFPID-0015",
"CSAFPID-0016",
"CSAFPID-0017",
"CSAFPID-0018",
"CSAFPID-0019",
"CSAFPID-0020"
]
}
],
"title": "CVE-2021-42379"
},
{
"cve": "CVE-2021-42380",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"notes": [
{
"category": "summary",
"text": "A use-after-free in awk leads to denial of service and possibly code execution when processing a crafted awk pattern in the clrvar function.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008",
"CSAFPID-0009",
"CSAFPID-0010",
"CSAFPID-0011",
"CSAFPID-0012",
"CSAFPID-0013",
"CSAFPID-0014",
"CSAFPID-0015",
"CSAFPID-0016",
"CSAFPID-0017",
"CSAFPID-0018",
"CSAFPID-0019",
"CSAFPID-0020"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V7.2 or later version",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008",
"CSAFPID-0009",
"CSAFPID-0010",
"CSAFPID-0011",
"CSAFPID-0012",
"CSAFPID-0013",
"CSAFPID-0014",
"CSAFPID-0015",
"CSAFPID-0016",
"CSAFPID-0017",
"CSAFPID-0018",
"CSAFPID-0019",
"CSAFPID-0020"
],
"url": "https://support.industry.siemens.com/cs/document/109817007/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.6,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008",
"CSAFPID-0009",
"CSAFPID-0010",
"CSAFPID-0011",
"CSAFPID-0012",
"CSAFPID-0013",
"CSAFPID-0014",
"CSAFPID-0015",
"CSAFPID-0016",
"CSAFPID-0017",
"CSAFPID-0018",
"CSAFPID-0019",
"CSAFPID-0020"
]
}
],
"title": "CVE-2021-42380"
},
{
"cve": "CVE-2021-42381",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"notes": [
{
"category": "summary",
"text": "A use-after-free in awk leads to denial of service and possibly code execution when processing a crafted awk pattern in the hash_init function.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008",
"CSAFPID-0009",
"CSAFPID-0010",
"CSAFPID-0011",
"CSAFPID-0012",
"CSAFPID-0013",
"CSAFPID-0014",
"CSAFPID-0015",
"CSAFPID-0016",
"CSAFPID-0017",
"CSAFPID-0018",
"CSAFPID-0019",
"CSAFPID-0020"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V7.2 or later version",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008",
"CSAFPID-0009",
"CSAFPID-0010",
"CSAFPID-0011",
"CSAFPID-0012",
"CSAFPID-0013",
"CSAFPID-0014",
"CSAFPID-0015",
"CSAFPID-0016",
"CSAFPID-0017",
"CSAFPID-0018",
"CSAFPID-0019",
"CSAFPID-0020"
],
"url": "https://support.industry.siemens.com/cs/document/109817007/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.6,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008",
"CSAFPID-0009",
"CSAFPID-0010",
"CSAFPID-0011",
"CSAFPID-0012",
"CSAFPID-0013",
"CSAFPID-0014",
"CSAFPID-0015",
"CSAFPID-0016",
"CSAFPID-0017",
"CSAFPID-0018",
"CSAFPID-0019",
"CSAFPID-0020"
]
}
],
"title": "CVE-2021-42381"
},
{
"cve": "CVE-2021-42382",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"notes": [
{
"category": "summary",
"text": "A use-after-free in awk leads to denial of service and possibly code execution when processing a crafted awk pattern in the getvar_s function.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008",
"CSAFPID-0009",
"CSAFPID-0010",
"CSAFPID-0011",
"CSAFPID-0012",
"CSAFPID-0013",
"CSAFPID-0014",
"CSAFPID-0015",
"CSAFPID-0016",
"CSAFPID-0017",
"CSAFPID-0018",
"CSAFPID-0019",
"CSAFPID-0020"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V7.2 or later version",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008",
"CSAFPID-0009",
"CSAFPID-0010",
"CSAFPID-0011",
"CSAFPID-0012",
"CSAFPID-0013",
"CSAFPID-0014",
"CSAFPID-0015",
"CSAFPID-0016",
"CSAFPID-0017",
"CSAFPID-0018",
"CSAFPID-0019",
"CSAFPID-0020"
],
"url": "https://support.industry.siemens.com/cs/document/109817007/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.6,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008",
"CSAFPID-0009",
"CSAFPID-0010",
"CSAFPID-0011",
"CSAFPID-0012",
"CSAFPID-0013",
"CSAFPID-0014",
"CSAFPID-0015",
"CSAFPID-0016",
"CSAFPID-0017",
"CSAFPID-0018",
"CSAFPID-0019",
"CSAFPID-0020"
]
}
],
"title": "CVE-2021-42382"
},
{
"cve": "CVE-2021-42383",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"notes": [
{
"category": "summary",
"text": "A use-after-free in awk leads to denial of service and possibly code execution when processing a crafted awk pattern in the evaluate function.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008",
"CSAFPID-0009",
"CSAFPID-0010",
"CSAFPID-0011",
"CSAFPID-0012",
"CSAFPID-0013",
"CSAFPID-0014",
"CSAFPID-0015",
"CSAFPID-0016",
"CSAFPID-0017",
"CSAFPID-0018",
"CSAFPID-0019",
"CSAFPID-0020"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V7.2 or later version",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008",
"CSAFPID-0009",
"CSAFPID-0010",
"CSAFPID-0011",
"CSAFPID-0012",
"CSAFPID-0013",
"CSAFPID-0014",
"CSAFPID-0015",
"CSAFPID-0016",
"CSAFPID-0017",
"CSAFPID-0018",
"CSAFPID-0019",
"CSAFPID-0020"
],
"url": "https://support.industry.siemens.com/cs/document/109817007/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.6,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008",
"CSAFPID-0009",
"CSAFPID-0010",
"CSAFPID-0011",
"CSAFPID-0012",
"CSAFPID-0013",
"CSAFPID-0014",
"CSAFPID-0015",
"CSAFPID-0016",
"CSAFPID-0017",
"CSAFPID-0018",
"CSAFPID-0019",
"CSAFPID-0020"
]
}
],
"title": "CVE-2021-42383"
},
{
"cve": "CVE-2021-42384",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"notes": [
{
"category": "summary",
"text": "A use-after-free in Busybox\u0027s awk applet leads to denial of service and possibly code execution when processing a crafted awk pattern in the handle_special function.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008",
"CSAFPID-0009",
"CSAFPID-0010",
"CSAFPID-0011",
"CSAFPID-0012",
"CSAFPID-0013",
"CSAFPID-0014",
"CSAFPID-0015",
"CSAFPID-0016",
"CSAFPID-0017",
"CSAFPID-0018",
"CSAFPID-0019",
"CSAFPID-0020"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V7.2 or later version",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008",
"CSAFPID-0009",
"CSAFPID-0010",
"CSAFPID-0011",
"CSAFPID-0012",
"CSAFPID-0013",
"CSAFPID-0014",
"CSAFPID-0015",
"CSAFPID-0016",
"CSAFPID-0017",
"CSAFPID-0018",
"CSAFPID-0019",
"CSAFPID-0020"
],
"url": "https://support.industry.siemens.com/cs/document/109817007/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.6,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008",
"CSAFPID-0009",
"CSAFPID-0010",
"CSAFPID-0011",
"CSAFPID-0012",
"CSAFPID-0013",
"CSAFPID-0014",
"CSAFPID-0015",
"CSAFPID-0016",
"CSAFPID-0017",
"CSAFPID-0018",
"CSAFPID-0019",
"CSAFPID-0020"
]
}
],
"title": "CVE-2021-42384"
},
{
"cve": "CVE-2021-42385",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"notes": [
{
"category": "summary",
"text": "A use-after-free in awk leads to denial of service and possibly code execution when processing a crafted awk pattern in the evaluate function.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008",
"CSAFPID-0009",
"CSAFPID-0010",
"CSAFPID-0011",
"CSAFPID-0012",
"CSAFPID-0013",
"CSAFPID-0014",
"CSAFPID-0015",
"CSAFPID-0016",
"CSAFPID-0017",
"CSAFPID-0018",
"CSAFPID-0019",
"CSAFPID-0020"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V7.2 or later version",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008",
"CSAFPID-0009",
"CSAFPID-0010",
"CSAFPID-0011",
"CSAFPID-0012",
"CSAFPID-0013",
"CSAFPID-0014",
"CSAFPID-0015",
"CSAFPID-0016",
"CSAFPID-0017",
"CSAFPID-0018",
"CSAFPID-0019",
"CSAFPID-0020"
],
"url": "https://support.industry.siemens.com/cs/document/109817007/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.6,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008",
"CSAFPID-0009",
"CSAFPID-0010",
"CSAFPID-0011",
"CSAFPID-0012",
"CSAFPID-0013",
"CSAFPID-0014",
"CSAFPID-0015",
"CSAFPID-0016",
"CSAFPID-0017",
"CSAFPID-0018",
"CSAFPID-0019",
"CSAFPID-0020"
]
}
],
"title": "CVE-2021-42385"
},
{
"cve": "CVE-2021-42386",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"notes": [
{
"category": "summary",
"text": "A use-after-free in awk leads to denial of service and possibly code execution when processing a crafted awk pattern in the nvalloc function.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008",
"CSAFPID-0009",
"CSAFPID-0010",
"CSAFPID-0011",
"CSAFPID-0012",
"CSAFPID-0013",
"CSAFPID-0014",
"CSAFPID-0015",
"CSAFPID-0016",
"CSAFPID-0017",
"CSAFPID-0018",
"CSAFPID-0019",
"CSAFPID-0020"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V7.2 or later version",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008",
"CSAFPID-0009",
"CSAFPID-0010",
"CSAFPID-0011",
"CSAFPID-0012",
"CSAFPID-0013",
"CSAFPID-0014",
"CSAFPID-0015",
"CSAFPID-0016",
"CSAFPID-0017",
"CSAFPID-0018",
"CSAFPID-0019",
"CSAFPID-0020"
],
"url": "https://support.industry.siemens.com/cs/document/109817007/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.6,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008",
"CSAFPID-0009",
"CSAFPID-0010",
"CSAFPID-0011",
"CSAFPID-0012",
"CSAFPID-0013",
"CSAFPID-0014",
"CSAFPID-0015",
"CSAFPID-0016",
"CSAFPID-0017",
"CSAFPID-0018",
"CSAFPID-0019",
"CSAFPID-0020"
]
}
],
"title": "CVE-2021-42386"
},
{
"cve": "CVE-2022-0001",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "summary",
"text": "Non-transparent sharing of branch predictor selectors between contexts in some Intel(R) Processors may allow an authorized user to potentially enable information disclosure via local access.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008",
"CSAFPID-0009",
"CSAFPID-0010",
"CSAFPID-0011",
"CSAFPID-0012",
"CSAFPID-0013",
"CSAFPID-0014",
"CSAFPID-0015",
"CSAFPID-0016",
"CSAFPID-0017",
"CSAFPID-0018",
"CSAFPID-0019",
"CSAFPID-0020"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V7.2 or later version",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008",
"CSAFPID-0009",
"CSAFPID-0010",
"CSAFPID-0011",
"CSAFPID-0012",
"CSAFPID-0013",
"CSAFPID-0014",
"CSAFPID-0015",
"CSAFPID-0016",
"CSAFPID-0017",
"CSAFPID-0018",
"CSAFPID-0019",
"CSAFPID-0020"
],
"url": "https://support.industry.siemens.com/cs/document/109817007/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008",
"CSAFPID-0009",
"CSAFPID-0010",
"CSAFPID-0011",
"CSAFPID-0012",
"CSAFPID-0013",
"CSAFPID-0014",
"CSAFPID-0015",
"CSAFPID-0016",
"CSAFPID-0017",
"CSAFPID-0018",
"CSAFPID-0019",
"CSAFPID-0020"
]
}
],
"title": "CVE-2022-0001"
},
{
"cve": "CVE-2022-0002",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "summary",
"text": "Non-transparent sharing of branch predictor within a context in some Intel(R) Processors may allow an authorized user to potentially enable information disclosure via local access.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008",
"CSAFPID-0009",
"CSAFPID-0010",
"CSAFPID-0011",
"CSAFPID-0012",
"CSAFPID-0013",
"CSAFPID-0014",
"CSAFPID-0015",
"CSAFPID-0016",
"CSAFPID-0017",
"CSAFPID-0018",
"CSAFPID-0019",
"CSAFPID-0020"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V7.2 or later version",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008",
"CSAFPID-0009",
"CSAFPID-0010",
"CSAFPID-0011",
"CSAFPID-0012",
"CSAFPID-0013",
"CSAFPID-0014",
"CSAFPID-0015",
"CSAFPID-0016",
"CSAFPID-0017",
"CSAFPID-0018",
"CSAFPID-0019",
"CSAFPID-0020"
],
"url": "https://support.industry.siemens.com/cs/document/109817007/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008",
"CSAFPID-0009",
"CSAFPID-0010",
"CSAFPID-0011",
"CSAFPID-0012",
"CSAFPID-0013",
"CSAFPID-0014",
"CSAFPID-0015",
"CSAFPID-0016",
"CSAFPID-0017",
"CSAFPID-0018",
"CSAFPID-0019",
"CSAFPID-0020"
]
}
],
"title": "CVE-2022-0002"
},
{
"cve": "CVE-2022-0494",
"cwe": {
"id": "CWE-200",
"name": "Exposure of Sensitive Information to an Unauthorized Actor"
},
"notes": [
{
"category": "summary",
"text": "A kernel information leak flaw was identified in the scsi_ioctl function in drivers/scsi/scsi_ioctl.c in the Linux kernel. This flaw allows a local attacker with a special user privilege (CAP_SYS_ADMIN or CAP_SYS_RAWIO) to create issues with confidentiality.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008",
"CSAFPID-0009",
"CSAFPID-0010",
"CSAFPID-0011",
"CSAFPID-0012",
"CSAFPID-0013",
"CSAFPID-0014",
"CSAFPID-0015",
"CSAFPID-0016",
"CSAFPID-0017",
"CSAFPID-0018",
"CSAFPID-0019",
"CSAFPID-0020"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V7.2 or later version",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008",
"CSAFPID-0009",
"CSAFPID-0010",
"CSAFPID-0011",
"CSAFPID-0012",
"CSAFPID-0013",
"CSAFPID-0014",
"CSAFPID-0015",
"CSAFPID-0016",
"CSAFPID-0017",
"CSAFPID-0018",
"CSAFPID-0019",
"CSAFPID-0020"
],
"url": "https://support.industry.siemens.com/cs/document/109817007/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008",
"CSAFPID-0009",
"CSAFPID-0010",
"CSAFPID-0011",
"CSAFPID-0012",
"CSAFPID-0013",
"CSAFPID-0014",
"CSAFPID-0015",
"CSAFPID-0016",
"CSAFPID-0017",
"CSAFPID-0018",
"CSAFPID-0019",
"CSAFPID-0020"
]
}
],
"title": "CVE-2022-0494"
},
{
"cve": "CVE-2022-0547",
"cwe": {
"id": "CWE-287",
"name": "Improper Authentication"
},
"notes": [
{
"category": "summary",
"text": "OpenVPN 2.1 until v2.4.12 and v2.5.6 may enable authentication bypass in external authentication plug-ins when more than one of them makes use of deferred authentication replies, which allows an external user to be granted access with only partially correct credentials.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008",
"CSAFPID-0009",
"CSAFPID-0010",
"CSAFPID-0011",
"CSAFPID-0012",
"CSAFPID-0013",
"CSAFPID-0014",
"CSAFPID-0015",
"CSAFPID-0016",
"CSAFPID-0017",
"CSAFPID-0018",
"CSAFPID-0019",
"CSAFPID-0020"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V7.2 or later version",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008",
"CSAFPID-0009",
"CSAFPID-0010",
"CSAFPID-0011",
"CSAFPID-0012",
"CSAFPID-0013",
"CSAFPID-0014",
"CSAFPID-0015",
"CSAFPID-0016",
"CSAFPID-0017",
"CSAFPID-0018",
"CSAFPID-0019",
"CSAFPID-0020"
],
"url": "https://support.industry.siemens.com/cs/document/109817007/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008",
"CSAFPID-0009",
"CSAFPID-0010",
"CSAFPID-0011",
"CSAFPID-0012",
"CSAFPID-0013",
"CSAFPID-0014",
"CSAFPID-0015",
"CSAFPID-0016",
"CSAFPID-0017",
"CSAFPID-0018",
"CSAFPID-0019",
"CSAFPID-0020"
]
}
],
"title": "CVE-2022-0547"
},
{
"cve": "CVE-2022-1011",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"notes": [
{
"category": "summary",
"text": "A use-after-free flaw was found in the Linux kernel\u2019s FUSE filesystem in the way a user triggers write(). This flaw allows a local user to gain unauthorized access to data from the FUSE filesystem, resulting in privilege escalation.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008",
"CSAFPID-0009",
"CSAFPID-0010",
"CSAFPID-0011",
"CSAFPID-0012",
"CSAFPID-0013",
"CSAFPID-0014",
"CSAFPID-0015",
"CSAFPID-0016",
"CSAFPID-0017",
"CSAFPID-0018",
"CSAFPID-0019",
"CSAFPID-0020"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V7.2 or later version",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008",
"CSAFPID-0009",
"CSAFPID-0010",
"CSAFPID-0011",
"CSAFPID-0012",
"CSAFPID-0013",
"CSAFPID-0014",
"CSAFPID-0015",
"CSAFPID-0016",
"CSAFPID-0017",
"CSAFPID-0018",
"CSAFPID-0019",
"CSAFPID-0020"
],
"url": "https://support.industry.siemens.com/cs/document/109817007/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008",
"CSAFPID-0009",
"CSAFPID-0010",
"CSAFPID-0011",
"CSAFPID-0012",
"CSAFPID-0013",
"CSAFPID-0014",
"CSAFPID-0015",
"CSAFPID-0016",
"CSAFPID-0017",
"CSAFPID-0018",
"CSAFPID-0019",
"CSAFPID-0020"
]
}
],
"title": "CVE-2022-1011"
},
{
"cve": "CVE-2022-1016",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"notes": [
{
"category": "summary",
"text": "A flaw was found in the Linux kernel in net/netfilter/nf_tables_core.c:nft_do_chain, which can cause a use-after-free. This issue needs to handle \u0027return\u0027 with proper preconditions, as it can lead to a kernel information leak problem caused by a local, unprivileged attacker.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008",
"CSAFPID-0009",
"CSAFPID-0010",
"CSAFPID-0011",
"CSAFPID-0012",
"CSAFPID-0013",
"CSAFPID-0014",
"CSAFPID-0015",
"CSAFPID-0016",
"CSAFPID-0017",
"CSAFPID-0018",
"CSAFPID-0019",
"CSAFPID-0020"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V7.2 or later version",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008",
"CSAFPID-0009",
"CSAFPID-0010",
"CSAFPID-0011",
"CSAFPID-0012",
"CSAFPID-0013",
"CSAFPID-0014",
"CSAFPID-0015",
"CSAFPID-0016",
"CSAFPID-0017",
"CSAFPID-0018",
"CSAFPID-0019",
"CSAFPID-0020"
],
"url": "https://support.industry.siemens.com/cs/document/109817007/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008",
"CSAFPID-0009",
"CSAFPID-0010",
"CSAFPID-0011",
"CSAFPID-0012",
"CSAFPID-0013",
"CSAFPID-0014",
"CSAFPID-0015",
"CSAFPID-0016",
"CSAFPID-0017",
"CSAFPID-0018",
"CSAFPID-0019",
"CSAFPID-0020"
]
}
],
"title": "CVE-2022-1016"
},
{
"cve": "CVE-2022-1198",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"notes": [
{
"category": "summary",
"text": "A use-after-free vulnerabilitity was discovered in drivers/net/hamradio/6pack.c of linux that allows an attacker to crash linux kernel by simulating ax25 device using 6pack driver from user space.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008",
"CSAFPID-0009",
"CSAFPID-0010",
"CSAFPID-0011",
"CSAFPID-0012",
"CSAFPID-0013",
"CSAFPID-0014",
"CSAFPID-0015",
"CSAFPID-0016",
"CSAFPID-0017",
"CSAFPID-0018",
"CSAFPID-0019",
"CSAFPID-0020"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V7.2 or later version",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008",
"CSAFPID-0009",
"CSAFPID-0010",
"CSAFPID-0011",
"CSAFPID-0012",
"CSAFPID-0013",
"CSAFPID-0014",
"CSAFPID-0015",
"CSAFPID-0016",
"CSAFPID-0017",
"CSAFPID-0018",
"CSAFPID-0019",
"CSAFPID-0020"
],
"url": "https://support.industry.siemens.com/cs/document/109817007/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008",
"CSAFPID-0009",
"CSAFPID-0010",
"CSAFPID-0011",
"CSAFPID-0012",
"CSAFPID-0013",
"CSAFPID-0014",
"CSAFPID-0015",
"CSAFPID-0016",
"CSAFPID-0017",
"CSAFPID-0018",
"CSAFPID-0019",
"CSAFPID-0020"
]
}
],
"title": "CVE-2022-1198"
},
{
"cve": "CVE-2022-1199",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"notes": [
{
"category": "summary",
"text": "A flaw was found in the Linux kernel. This flaw allows an attacker to crash the Linux kernel by simulating amateur radio from the user space, resulting in a null-ptr-deref vulnerability and a use-after-free vulnerability.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008",
"CSAFPID-0009",
"CSAFPID-0010",
"CSAFPID-0011",
"CSAFPID-0012",
"CSAFPID-0013",
"CSAFPID-0014",
"CSAFPID-0015",
"CSAFPID-0016",
"CSAFPID-0017",
"CSAFPID-0018",
"CSAFPID-0019",
"CSAFPID-0020"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V7.2 or later version",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008",
"CSAFPID-0009",
"CSAFPID-0010",
"CSAFPID-0011",
"CSAFPID-0012",
"CSAFPID-0013",
"CSAFPID-0014",
"CSAFPID-0015",
"CSAFPID-0016",
"CSAFPID-0017",
"CSAFPID-0018",
"CSAFPID-0019",
"CSAFPID-0020"
],
"url": "https://support.industry.siemens.com/cs/document/109817007/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008",
"CSAFPID-0009",
"CSAFPID-0010",
"CSAFPID-0011",
"CSAFPID-0012",
"CSAFPID-0013",
"CSAFPID-0014",
"CSAFPID-0015",
"CSAFPID-0016",
"CSAFPID-0017",
"CSAFPID-0018",
"CSAFPID-0019",
"CSAFPID-0020"
]
}
],
"title": "CVE-2022-1199"
},
{
"cve": "CVE-2022-1292",
"cwe": {
"id": "CWE-78",
"name": "Improper Neutralization of Special Elements used in an OS Command (\u0027OS Command Injection\u0027)"
},
"notes": [
{
"category": "summary",
"text": "The c_rehash script does not properly sanitise shell metacharacters to prevent command injection.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008",
"CSAFPID-0009",
"CSAFPID-0010",
"CSAFPID-0011",
"CSAFPID-0012",
"CSAFPID-0013",
"CSAFPID-0014",
"CSAFPID-0015",
"CSAFPID-0016",
"CSAFPID-0017",
"CSAFPID-0018",
"CSAFPID-0019",
"CSAFPID-0020"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V7.2 or later version",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008",
"CSAFPID-0009",
"CSAFPID-0010",
"CSAFPID-0011",
"CSAFPID-0012",
"CSAFPID-0013",
"CSAFPID-0014",
"CSAFPID-0015",
"CSAFPID-0016",
"CSAFPID-0017",
"CSAFPID-0018",
"CSAFPID-0019",
"CSAFPID-0020"
],
"url": "https://support.industry.siemens.com/cs/document/109817007/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008",
"CSAFPID-0009",
"CSAFPID-0010",
"CSAFPID-0011",
"CSAFPID-0012",
"CSAFPID-0013",
"CSAFPID-0014",
"CSAFPID-0015",
"CSAFPID-0016",
"CSAFPID-0017",
"CSAFPID-0018",
"CSAFPID-0019",
"CSAFPID-0020"
]
}
],
"title": "CVE-2022-1292"
},
{
"cve": "CVE-2022-1304",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"notes": [
{
"category": "summary",
"text": "An out-of-bounds read/write vulnerability was found in e2fsprogs 1.46.5. This issue leads to a segmentation fault and possibly arbitrary code execution via a specially crafted filesystem.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008",
"CSAFPID-0009",
"CSAFPID-0010",
"CSAFPID-0011",
"CSAFPID-0012",
"CSAFPID-0013",
"CSAFPID-0014",
"CSAFPID-0015",
"CSAFPID-0016",
"CSAFPID-0017",
"CSAFPID-0018",
"CSAFPID-0019",
"CSAFPID-0020"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V7.2 or later version",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008",
"CSAFPID-0009",
"CSAFPID-0010",
"CSAFPID-0011",
"CSAFPID-0012",
"CSAFPID-0013",
"CSAFPID-0014",
"CSAFPID-0015",
"CSAFPID-0016",
"CSAFPID-0017",
"CSAFPID-0018",
"CSAFPID-0019",
"CSAFPID-0020"
],
"url": "https://support.industry.siemens.com/cs/document/109817007/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008",
"CSAFPID-0009",
"CSAFPID-0010",
"CSAFPID-0011",
"CSAFPID-0012",
"CSAFPID-0013",
"CSAFPID-0014",
"CSAFPID-0015",
"CSAFPID-0016",
"CSAFPID-0017",
"CSAFPID-0018",
"CSAFPID-0019",
"CSAFPID-0020"
]
}
],
"title": "CVE-2022-1304"
},
{
"cve": "CVE-2022-1343",
"cwe": {
"id": "CWE-295",
"name": "Improper Certificate Validation"
},
"notes": [
{
"category": "summary",
"text": "Under certain circumstances, the command line OCSP verify function reports successful verification when the varification in fact failed. In this case the incorrect successful response will also be accompanied by error messages showing the failure and contradicting the apparently successful result.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008",
"CSAFPID-0009",
"CSAFPID-0010",
"CSAFPID-0011",
"CSAFPID-0012",
"CSAFPID-0013",
"CSAFPID-0014",
"CSAFPID-0015",
"CSAFPID-0016",
"CSAFPID-0017",
"CSAFPID-0018",
"CSAFPID-0019",
"CSAFPID-0020"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V7.2 or later version",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008",
"CSAFPID-0009",
"CSAFPID-0010",
"CSAFPID-0011",
"CSAFPID-0012",
"CSAFPID-0013",
"CSAFPID-0014",
"CSAFPID-0015",
"CSAFPID-0016",
"CSAFPID-0017",
"CSAFPID-0018",
"CSAFPID-0019",
"CSAFPID-0020"
],
"url": "https://support.industry.siemens.com/cs/document/109817007/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008",
"CSAFPID-0009",
"CSAFPID-0010",
"CSAFPID-0011",
"CSAFPID-0012",
"CSAFPID-0013",
"CSAFPID-0014",
"CSAFPID-0015",
"CSAFPID-0016",
"CSAFPID-0017",
"CSAFPID-0018",
"CSAFPID-0019",
"CSAFPID-0020"
]
}
],
"title": "CVE-2022-1343"
},
{
"cve": "CVE-2022-1353",
"cwe": {
"id": "CWE-200",
"name": "Exposure of Sensitive Information to an Unauthorized Actor"
},
"notes": [
{
"category": "summary",
"text": "A vulnerability was found in the pfkey_register function in net/key/af_key.c in the Linux kernel. This flaw allows a local, unprivileged user to gain access to kernel memory, leading to a system crash or a leak of internal kernel information.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008",
"CSAFPID-0009",
"CSAFPID-0010",
"CSAFPID-0011",
"CSAFPID-0012",
"CSAFPID-0013",
"CSAFPID-0014",
"CSAFPID-0015",
"CSAFPID-0016",
"CSAFPID-0017",
"CSAFPID-0018",
"CSAFPID-0019",
"CSAFPID-0020"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V7.2 or later version",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008",
"CSAFPID-0009",
"CSAFPID-0010",
"CSAFPID-0011",
"CSAFPID-0012",
"CSAFPID-0013",
"CSAFPID-0014",
"CSAFPID-0015",
"CSAFPID-0016",
"CSAFPID-0017",
"CSAFPID-0018",
"CSAFPID-0019",
"CSAFPID-0020"
],
"url": "https://support.industry.siemens.com/cs/document/109817007/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.1,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008",
"CSAFPID-0009",
"CSAFPID-0010",
"CSAFPID-0011",
"CSAFPID-0012",
"CSAFPID-0013",
"CSAFPID-0014",
"CSAFPID-0015",
"CSAFPID-0016",
"CSAFPID-0017",
"CSAFPID-0018",
"CSAFPID-0019",
"CSAFPID-0020"
]
}
],
"title": "CVE-2022-1353"
},
{
"cve": "CVE-2022-1473",
"cwe": {
"id": "CWE-404",
"name": "Improper Resource Shutdown or Release"
},
"notes": [
{
"category": "summary",
"text": "The used OpenSSL version improperly reuses memory when decoding certificates or keys. This can lead to a process termination and Denial of Service for long lived processes.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008",
"CSAFPID-0009",
"CSAFPID-0010",
"CSAFPID-0011",
"CSAFPID-0012",
"CSAFPID-0013",
"CSAFPID-0014",
"CSAFPID-0015",
"CSAFPID-0016",
"CSAFPID-0017",
"CSAFPID-0018",
"CSAFPID-0019",
"CSAFPID-0020"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V7.2 or later version",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008",
"CSAFPID-0009",
"CSAFPID-0010",
"CSAFPID-0011",
"CSAFPID-0012",
"CSAFPID-0013",
"CSAFPID-0014",
"CSAFPID-0015",
"CSAFPID-0016",
"CSAFPID-0017",
"CSAFPID-0018",
"CSAFPID-0019",
"CSAFPID-0020"
],
"url": "https://support.industry.siemens.com/cs/document/109817007/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008",
"CSAFPID-0009",
"CSAFPID-0010",
"CSAFPID-0011",
"CSAFPID-0012",
"CSAFPID-0013",
"CSAFPID-0014",
"CSAFPID-0015",
"CSAFPID-0016",
"CSAFPID-0017",
"CSAFPID-0018",
"CSAFPID-0019",
"CSAFPID-0020"
]
}
],
"title": "CVE-2022-1473"
},
{
"cve": "CVE-2022-1516",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"notes": [
{
"category": "summary",
"text": "A NULL pointer dereference flaw was found in the Linux kernel\u2019s X.25 set of standardized network protocols functionality in the way a user terminates their session using a simulated Ethernet card and continued usage of this connection. This flaw allows a local user to crash the system.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008",
"CSAFPID-0009",
"CSAFPID-0010",
"CSAFPID-0011",
"CSAFPID-0012",
"CSAFPID-0013",
"CSAFPID-0014",
"CSAFPID-0015",
"CSAFPID-0016",
"CSAFPID-0017",
"CSAFPID-0018",
"CSAFPID-0019",
"CSAFPID-0020"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V7.2 or later version",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008",
"CSAFPID-0009",
"CSAFPID-0010",
"CSAFPID-0011",
"CSAFPID-0012",
"CSAFPID-0013",
"CSAFPID-0014",
"CSAFPID-0015",
"CSAFPID-0016",
"CSAFPID-0017",
"CSAFPID-0018",
"CSAFPID-0019",
"CSAFPID-0020"
],
"url": "https://support.industry.siemens.com/cs/document/109817007/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008",
"CSAFPID-0009",
"CSAFPID-0010",
"CSAFPID-0011",
"CSAFPID-0012",
"CSAFPID-0013",
"CSAFPID-0014",
"CSAFPID-0015",
"CSAFPID-0016",
"CSAFPID-0017",
"CSAFPID-0018",
"CSAFPID-0019",
"CSAFPID-0020"
]
}
],
"title": "CVE-2022-1516"
},
{
"cve": "CVE-2022-1652",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"notes": [
{
"category": "summary",
"text": "Linux Kernel could allow a local attacker to execute arbitrary code on the system, caused by a concurrency use-after-free flaw in the bad_flp_intr function. By executing a specially-crafted program, an attacker could exploit this vulnerability to execute arbitrary code or cause a denial of service condition on the system.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008",
"CSAFPID-0009",
"CSAFPID-0010",
"CSAFPID-0011",
"CSAFPID-0012",
"CSAFPID-0013",
"CSAFPID-0014",
"CSAFPID-0015",
"CSAFPID-0016",
"CSAFPID-0017",
"CSAFPID-0018",
"CSAFPID-0019",
"CSAFPID-0020"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V7.2 or later version",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008",
"CSAFPID-0009",
"CSAFPID-0010",
"CSAFPID-0011",
"CSAFPID-0012",
"CSAFPID-0013",
"CSAFPID-0014",
"CSAFPID-0015",
"CSAFPID-0016",
"CSAFPID-0017",
"CSAFPID-0018",
"CSAFPID-0019",
"CSAFPID-0020"
],
"url": "https://support.industry.siemens.com/cs/document/109817007/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008",
"CSAFPID-0009",
"CSAFPID-0010",
"CSAFPID-0011",
"CSAFPID-0012",
"CSAFPID-0013",
"CSAFPID-0014",
"CSAFPID-0015",
"CSAFPID-0016",
"CSAFPID-0017",
"CSAFPID-0018",
"CSAFPID-0019",
"CSAFPID-0020"
]
}
],
"title": "CVE-2022-1652"
},
{
"cve": "CVE-2022-1729",
"cwe": {
"id": "CWE-362",
"name": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)"
},
"notes": [
{
"category": "summary",
"text": "A race condition was found the Linux kernel in perf_event_open() which can be exploited by an unprivileged user to gain root privileges. The bug allows to build several exploit primitives such as kernel address information leak, arbitrary execution, etc.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008",
"CSAFPID-0009",
"CSAFPID-0010",
"CSAFPID-0011",
"CSAFPID-0012",
"CSAFPID-0013",
"CSAFPID-0014",
"CSAFPID-0015",
"CSAFPID-0016",
"CSAFPID-0017",
"CSAFPID-0018",
"CSAFPID-0019",
"CSAFPID-0020"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V7.2 or later version",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008",
"CSAFPID-0009",
"CSAFPID-0010",
"CSAFPID-0011",
"CSAFPID-0012",
"CSAFPID-0013",
"CSAFPID-0014",
"CSAFPID-0015",
"CSAFPID-0016",
"CSAFPID-0017",
"CSAFPID-0018",
"CSAFPID-0019",
"CSAFPID-0020"
],
"url": "https://support.industry.siemens.com/cs/document/109817007/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.0,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008",
"CSAFPID-0009",
"CSAFPID-0010",
"CSAFPID-0011",
"CSAFPID-0012",
"CSAFPID-0013",
"CSAFPID-0014",
"CSAFPID-0015",
"CSAFPID-0016",
"CSAFPID-0017",
"CSAFPID-0018",
"CSAFPID-0019",
"CSAFPID-0020"
]
}
],
"title": "CVE-2022-1729"
},
{
"cve": "CVE-2022-1734",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"notes": [
{
"category": "summary",
"text": "A flaw in Linux Kernel found in nfcmrvl_nci_unregister_dev() in drivers/nfc/nfcmrvl/main.c can lead to use after free both read or write when non synchronized between cleanup routine and firmware download routine.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008",
"CSAFPID-0009",
"CSAFPID-0010",
"CSAFPID-0011",
"CSAFPID-0012",
"CSAFPID-0013",
"CSAFPID-0014",
"CSAFPID-0015",
"CSAFPID-0016",
"CSAFPID-0017",
"CSAFPID-0018",
"CSAFPID-0019",
"CSAFPID-0020"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V7.2 or later version",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008",
"CSAFPID-0009",
"CSAFPID-0010",
"CSAFPID-0011",
"CSAFPID-0012",
"CSAFPID-0013",
"CSAFPID-0014",
"CSAFPID-0015",
"CSAFPID-0016",
"CSAFPID-0017",
"CSAFPID-0018",
"CSAFPID-0019",
"CSAFPID-0020"
],
"url": "https://support.industry.siemens.com/cs/document/109817007/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.0,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008",
"CSAFPID-0009",
"CSAFPID-0010",
"CSAFPID-0011",
"CSAFPID-0012",
"CSAFPID-0013",
"CSAFPID-0014",
"CSAFPID-0015",
"CSAFPID-0016",
"CSAFPID-0017",
"CSAFPID-0018",
"CSAFPID-0019",
"CSAFPID-0020"
]
}
],
"title": "CVE-2022-1734"
},
{
"cve": "CVE-2022-1974",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"notes": [
{
"category": "summary",
"text": "A use-after-free flaw was found in the Linux kernel\u0027s NFC core functionality due to a race condition between kobject creation and delete. This vulnerability allows a local attacker with CAP_NET_ADMIN privilege to leak kernel information.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008",
"CSAFPID-0009",
"CSAFPID-0010",
"CSAFPID-0011",
"CSAFPID-0012",
"CSAFPID-0013",
"CSAFPID-0014",
"CSAFPID-0015",
"CSAFPID-0016",
"CSAFPID-0017",
"CSAFPID-0018",
"CSAFPID-0019",
"CSAFPID-0020"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V7.2 or later version",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008",
"CSAFPID-0009",
"CSAFPID-0010",
"CSAFPID-0011",
"CSAFPID-0012",
"CSAFPID-0013",
"CSAFPID-0014",
"CSAFPID-0015",
"CSAFPID-0016",
"CSAFPID-0017",
"CSAFPID-0018",
"CSAFPID-0019",
"CSAFPID-0020"
],
"url": "https://support.industry.siemens.com/cs/document/109817007/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.1,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:N/A:N/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008",
"CSAFPID-0009",
"CSAFPID-0010",
"CSAFPID-0011",
"CSAFPID-0012",
"CSAFPID-0013",
"CSAFPID-0014",
"CSAFPID-0015",
"CSAFPID-0016",
"CSAFPID-0017",
"CSAFPID-0018",
"CSAFPID-0019",
"CSAFPID-0020"
]
}
],
"title": "CVE-2022-1974"
},
{
"cve": "CVE-2022-1975",
"cwe": {
"id": "CWE-248",
"name": "Uncaught Exception"
},
"notes": [
{
"category": "summary",
"text": "There is a sleep-in-atomic bug in /net/nfc/netlink.c that allows an attacker to crash the Linux kernel by simulating a nfc device from user-space.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008",
"CSAFPID-0009",
"CSAFPID-0010",
"CSAFPID-0011",
"CSAFPID-0012",
"CSAFPID-0013",
"CSAFPID-0014",
"CSAFPID-0015",
"CSAFPID-0016",
"CSAFPID-0017",
"CSAFPID-0018",
"CSAFPID-0019",
"CSAFPID-0020"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V7.2 or later version",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008",
"CSAFPID-0009",
"CSAFPID-0010",
"CSAFPID-0011",
"CSAFPID-0012",
"CSAFPID-0013",
"CSAFPID-0014",
"CSAFPID-0015",
"CSAFPID-0016",
"CSAFPID-0017",
"CSAFPID-0018",
"CSAFPID-0019",
"CSAFPID-0020"
],
"url": "https://support.industry.siemens.com/cs/document/109817007/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008",
"CSAFPID-0009",
"CSAFPID-0010",
"CSAFPID-0011",
"CSAFPID-0012",
"CSAFPID-0013",
"CSAFPID-0014",
"CSAFPID-0015",
"CSAFPID-0016",
"CSAFPID-0017",
"CSAFPID-0018",
"CSAFPID-0019",
"CSAFPID-0020"
]
}
],
"title": "CVE-2022-1975"
},
{
"cve": "CVE-2022-2380",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"notes": [
{
"category": "summary",
"text": "The Linux kernel was found vulnerable out of bounds memory access in the drivers/video/fbdev/sm712fb.c:smtcfb_read() function. The vulnerability could result in local attackers being able to crash the kernel.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008",
"CSAFPID-0009",
"CSAFPID-0010",
"CSAFPID-0011",
"CSAFPID-0012",
"CSAFPID-0013",
"CSAFPID-0014",
"CSAFPID-0015",
"CSAFPID-0016",
"CSAFPID-0017",
"CSAFPID-0018",
"CSAFPID-0019",
"CSAFPID-0020"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V7.2 or later version",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008",
"CSAFPID-0009",
"CSAFPID-0010",
"CSAFPID-0011",
"CSAFPID-0012",
"CSAFPID-0013",
"CSAFPID-0014",
"CSAFPID-0015",
"CSAFPID-0016",
"CSAFPID-0017",
"CSAFPID-0018",
"CSAFPID-0019",
"CSAFPID-0020"
],
"url": "https://support.industry.siemens.com/cs/document/109817007/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008",
"CSAFPID-0009",
"CSAFPID-0010",
"CSAFPID-0011",
"CSAFPID-0012",
"CSAFPID-0013",
"CSAFPID-0014",
"CSAFPID-0015",
"CSAFPID-0016",
"CSAFPID-0017",
"CSAFPID-0018",
"CSAFPID-0019",
"CSAFPID-0020"
]
}
],
"title": "CVE-2022-2380"
},
{
"cve": "CVE-2022-2588",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "summary",
"text": "Zhenpeng Lin discovered that the network packet scheduler implementation in the Linux kernel did not properly remove all references to a route filter before freeing it in some situations. A local attacker could use this to cause a denial of service (system crash) or execute arbitrary code.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008",
"CSAFPID-0009",
"CSAFPID-0010",
"CSAFPID-0011",
"CSAFPID-0012",
"CSAFPID-0013",
"CSAFPID-0014",
"CSAFPID-0015",
"CSAFPID-0016",
"CSAFPID-0017",
"CSAFPID-0018",
"CSAFPID-0019",
"CSAFPID-0020"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V7.2 or later version",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008",
"CSAFPID-0009",
"CSAFPID-0010",
"CSAFPID-0011",
"CSAFPID-0012",
"CSAFPID-0013",
"CSAFPID-0014",
"CSAFPID-0015",
"CSAFPID-0016",
"CSAFPID-0017",
"CSAFPID-0018",
"CSAFPID-0019",
"CSAFPID-0020"
],
"url": "https://support.industry.siemens.com/cs/document/109817007/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008",
"CSAFPID-0009",
"CSAFPID-0010",
"CSAFPID-0011",
"CSAFPID-0012",
"CSAFPID-0013",
"CSAFPID-0014",
"CSAFPID-0015",
"CSAFPID-0016",
"CSAFPID-0017",
"CSAFPID-0018",
"CSAFPID-0019",
"CSAFPID-0020"
]
}
],
"title": "CVE-2022-2588"
},
{
"cve": "CVE-2022-2639",
"cwe": {
"id": "CWE-191",
"name": "Integer Underflow (Wrap or Wraparound)"
},
"notes": [
{
"category": "summary",
"text": "An integer coercion error was found in the openvswitch kernel module. Given a sufficiently large number of actions, while copying and reserving memory for a new action of a new flow, the reserve_sfa_size() function does not return -EMSGSIZE as expected, potentially leading to an out-of-bounds write access. This flaw allows a local user to crash or potentially escalate their privileges on the system.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008",
"CSAFPID-0009",
"CSAFPID-0010",
"CSAFPID-0011",
"CSAFPID-0012",
"CSAFPID-0013",
"CSAFPID-0014",
"CSAFPID-0015",
"CSAFPID-0016",
"CSAFPID-0017",
"CSAFPID-0018",
"CSAFPID-0019",
"CSAFPID-0020"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V7.2 or later version",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008",
"CSAFPID-0009",
"CSAFPID-0010",
"CSAFPID-0011",
"CSAFPID-0012",
"CSAFPID-0013",
"CSAFPID-0014",
"CSAFPID-0015",
"CSAFPID-0016",
"CSAFPID-0017",
"CSAFPID-0018",
"CSAFPID-0019",
"CSAFPID-0020"
],
"url": "https://support.industry.siemens.com/cs/document/109817007/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008",
"CSAFPID-0009",
"CSAFPID-0010",
"CSAFPID-0011",
"CSAFPID-0012",
"CSAFPID-0013",
"CSAFPID-0014",
"CSAFPID-0015",
"CSAFPID-0016",
"CSAFPID-0017",
"CSAFPID-0018",
"CSAFPID-0019",
"CSAFPID-0020"
]
}
],
"title": "CVE-2022-2639"
},
{
"cve": "CVE-2022-20158",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"notes": [
{
"category": "summary",
"text": "In bdi_put and bdi_unregister of backing-dev.c, there is a possible memory corruption due to a use after free. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-182815710References: Upstream kernel",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008",
"CSAFPID-0009",
"CSAFPID-0010",
"CSAFPID-0011",
"CSAFPID-0012",
"CSAFPID-0013",
"CSAFPID-0014",
"CSAFPID-0015",
"CSAFPID-0016",
"CSAFPID-0017",
"CSAFPID-0018",
"CSAFPID-0019",
"CSAFPID-0020"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V7.2 or later version",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008",
"CSAFPID-0009",
"CSAFPID-0010",
"CSAFPID-0011",
"CSAFPID-0012",
"CSAFPID-0013",
"CSAFPID-0014",
"CSAFPID-0015",
"CSAFPID-0016",
"CSAFPID-0017",
"CSAFPID-0018",
"CSAFPID-0019",
"CSAFPID-0020"
],
"url": "https://support.industry.siemens.com/cs/document/109817007/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008",
"CSAFPID-0009",
"CSAFPID-0010",
"CSAFPID-0011",
"CSAFPID-0012",
"CSAFPID-0013",
"CSAFPID-0014",
"CSAFPID-0015",
"CSAFPID-0016",
"CSAFPID-0017",
"CSAFPID-0018",
"CSAFPID-0019",
"CSAFPID-0020"
]
}
],
"title": "CVE-2022-20158"
},
{
"cve": "CVE-2022-23036",
"cwe": {
"id": "CWE-362",
"name": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)"
},
"notes": [
{
"category": "summary",
"text": "Linux PV device frontends vulnerable to attacks by backends [This CNA information record relates to multiple CVEs; the text explains which aspects/vulnerabilities correspond to which CVE.] Several Linux PV device frontends are using the grant table interfaces for removing access rights of the backends in ways being subject to race conditions, resulting in potential data leaks, data corruption by malicious backends, and denial of service triggered by malicious backends: blkfront, netfront, scsifront and the gntalloc driver are testing whether a grant reference is still in use. If this is not the case, they assume that a following removal of the granted access will always succeed, which is not true in case the backend has mapped the granted page between those two operations. As a result the backend can keep access to the memory page of the guest no matter how the page will be used after the frontend I/O has finished. The xenbus driver has a similar problem, as it doesn\u0027t check the success of removing the granted access of a shared ring buffer. blkfront: CVE-2022-23036 netfront: CVE-2022-23037 scsifront: CVE-2022-23038 gntalloc: CVE-2022-23039 xenbus: CVE-2022-23040 blkfront, netfront, scsifront, usbfront, dmabuf, xenbus, 9p, kbdfront, and pvcalls are using a functionality to delay freeing a grant reference until it is no longer in use, but the freeing of the related data page is not synchronized with dropping the granted access. As a result the backend can keep access to the memory page even after it has been freed and then re-used for a different purpose. CVE-2022-23041 netfront will fail a BUG_ON() assertion if it fails to revoke access in the rx path. This will result in a Denial of Service (DoS) situation of the guest which can be triggered by the backend.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008",
"CSAFPID-0009",
"CSAFPID-0010",
"CSAFPID-0011",
"CSAFPID-0012",
"CSAFPID-0013",
"CSAFPID-0014",
"CSAFPID-0015",
"CSAFPID-0016",
"CSAFPID-0017",
"CSAFPID-0018",
"CSAFPID-0019",
"CSAFPID-0020"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V7.2 or later version",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008",
"CSAFPID-0009",
"CSAFPID-0010",
"CSAFPID-0011",
"CSAFPID-0012",
"CSAFPID-0013",
"CSAFPID-0014",
"CSAFPID-0015",
"CSAFPID-0016",
"CSAFPID-0017",
"CSAFPID-0018",
"CSAFPID-0019",
"CSAFPID-0020"
],
"url": "https://support.industry.siemens.com/cs/document/109817007/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.0,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008",
"CSAFPID-0009",
"CSAFPID-0010",
"CSAFPID-0011",
"CSAFPID-0012",
"CSAFPID-0013",
"CSAFPID-0014",
"CSAFPID-0015",
"CSAFPID-0016",
"CSAFPID-0017",
"CSAFPID-0018",
"CSAFPID-0019",
"CSAFPID-0020"
]
}
],
"title": "CVE-2022-23036"
},
{
"cve": "CVE-2022-23037",
"cwe": {
"id": "CWE-362",
"name": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)"
},
"notes": [
{
"category": "summary",
"text": "Linux PV device frontends vulnerable to attacks by backends [This CNA information record relates to multiple CVEs; the text explains which aspects/vulnerabilities correspond to which CVE.] Several Linux PV device frontends are using the grant table interfaces for removing access rights of the backends in ways being subject to race conditions, resulting in potential data leaks, data corruption by malicious backends, and denial of service triggered by malicious backends: blkfront, netfront, scsifront and the gntalloc driver are testing whether a grant reference is still in use. If this is not the case, they assume that a following removal of the granted access will always succeed, which is not true in case the backend has mapped the granted page between those two operations. As a result the backend can keep access to the memory page of the guest no matter how the page will be used after the frontend I/O has finished. The xenbus driver has a similar problem, as it doesn\u0027t check the success of removing the granted access of a shared ring buffer. blkfront: CVE-2022-23036 netfront: CVE-2022-23037 scsifront: CVE-2022-23038 gntalloc: CVE-2022-23039 xenbus: CVE-2022-23040 blkfront, netfront, scsifront, usbfront, dmabuf, xenbus, 9p, kbdfront, and pvcalls are using a functionality to delay freeing a grant reference until it is no longer in use, but the freeing of the related data page is not synchronized with dropping the granted access. As a result the backend can keep access to the memory page even after it has been freed and then re-used for a different purpose. CVE-2022-23041 netfront will fail a BUG_ON() assertion if it fails to revoke access in the rx path. This will result in a Denial of Service (DoS) situation of the guest which can be triggered by the backend.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008",
"CSAFPID-0009",
"CSAFPID-0010",
"CSAFPID-0011",
"CSAFPID-0012",
"CSAFPID-0013",
"CSAFPID-0014",
"CSAFPID-0015",
"CSAFPID-0016",
"CSAFPID-0017",
"CSAFPID-0018",
"CSAFPID-0019",
"CSAFPID-0020"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V7.2 or later version",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008",
"CSAFPID-0009",
"CSAFPID-0010",
"CSAFPID-0011",
"CSAFPID-0012",
"CSAFPID-0013",
"CSAFPID-0014",
"CSAFPID-0015",
"CSAFPID-0016",
"CSAFPID-0017",
"CSAFPID-0018",
"CSAFPID-0019",
"CSAFPID-0020"
],
"url": "https://support.industry.siemens.com/cs/document/109817007/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.0,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008",
"CSAFPID-0009",
"CSAFPID-0010",
"CSAFPID-0011",
"CSAFPID-0012",
"CSAFPID-0013",
"CSAFPID-0014",
"CSAFPID-0015",
"CSAFPID-0016",
"CSAFPID-0017",
"CSAFPID-0018",
"CSAFPID-0019",
"CSAFPID-0020"
]
}
],
"title": "CVE-2022-23037"
},
{
"cve": "CVE-2022-23038",
"cwe": {
"id": "CWE-362",
"name": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)"
},
"notes": [
{
"category": "summary",
"text": "Linux PV device frontends vulnerable to attacks by backends [This CNA information record relates to multiple CVEs; the text explains which aspects/vulnerabilities correspond to which CVE.] Several Linux PV device frontends are using the grant table interfaces for removing access rights of the backends in ways being subject to race conditions, resulting in potential data leaks, data corruption by malicious backends, and denial of service triggered by malicious backends: blkfront, netfront, scsifront and the gntalloc driver are testing whether a grant reference is still in use. If this is not the case, they assume that a following removal of the granted access will always succeed, which is not true in case the backend has mapped the granted page between those two operations. As a result the backend can keep access to the memory page of the guest no matter how the page will be used after the frontend I/O has finished. The xenbus driver has a similar problem, as it doesn\u0027t check the success of removing the granted access of a shared ring buffer. blkfront: CVE-2022-23036 netfront: CVE-2022-23037 scsifront: CVE-2022-23038 gntalloc: CVE-2022-23039 xenbus: CVE-2022-23040 blkfront, netfront, scsifront, usbfront, dmabuf, xenbus, 9p, kbdfront, and pvcalls are using a functionality to delay freeing a grant reference until it is no longer in use, but the freeing of the related data page is not synchronized with dropping the granted access. As a result the backend can keep access to the memory page even after it has been freed and then re-used for a different purpose. CVE-2022-23041 netfront will fail a BUG_ON() assertion if it fails to revoke access in the rx path. This will result in a Denial of Service (DoS) situation of the guest which can be triggered by the backend.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008",
"CSAFPID-0009",
"CSAFPID-0010",
"CSAFPID-0011",
"CSAFPID-0012",
"CSAFPID-0013",
"CSAFPID-0014",
"CSAFPID-0015",
"CSAFPID-0016",
"CSAFPID-0017",
"CSAFPID-0018",
"CSAFPID-0019",
"CSAFPID-0020"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V7.2 or later version",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008",
"CSAFPID-0009",
"CSAFPID-0010",
"CSAFPID-0011",
"CSAFPID-0012",
"CSAFPID-0013",
"CSAFPID-0014",
"CSAFPID-0015",
"CSAFPID-0016",
"CSAFPID-0017",
"CSAFPID-0018",
"CSAFPID-0019",
"CSAFPID-0020"
],
"url": "https://support.industry.siemens.com/cs/document/109817007/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.0,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008",
"CSAFPID-0009",
"CSAFPID-0010",
"CSAFPID-0011",
"CSAFPID-0012",
"CSAFPID-0013",
"CSAFPID-0014",
"CSAFPID-0015",
"CSAFPID-0016",
"CSAFPID-0017",
"CSAFPID-0018",
"CSAFPID-0019",
"CSAFPID-0020"
]
}
],
"title": "CVE-2022-23038"
},
{
"cve": "CVE-2022-23039",
"cwe": {
"id": "CWE-362",
"name": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)"
},
"notes": [
{
"category": "summary",
"text": "Linux PV device frontends vulnerable to attacks by backends [This CNA information record relates to multiple CVEs; the text explains which aspects/vulnerabilities correspond to which CVE.] Several Linux PV device frontends are using the grant table interfaces for removing access rights of the backends in ways being subject to race conditions, resulting in potential data leaks, data corruption by malicious backends, and denial of service triggered by malicious backends: blkfront, netfront, scsifront and the gntalloc driver are testing whether a grant reference is still in use. If this is not the case, they assume that a following removal of the granted access will always succeed, which is not true in case the backend has mapped the granted page between those two operations. As a result the backend can keep access to the memory page of the guest no matter how the page will be used after the frontend I/O has finished. The xenbus driver has a similar problem, as it doesn\u0027t check the success of removing the granted access of a shared ring buffer. blkfront: CVE-2022-23036 netfront: CVE-2022-23037 scsifront: CVE-2022-23038 gntalloc: CVE-2022-23039 xenbus: CVE-2022-23040 blkfront, netfront, scsifront, usbfront, dmabuf, xenbus, 9p, kbdfront, and pvcalls are using a functionality to delay freeing a grant reference until it is no longer in use, but the freeing of the related data page is not synchronized with dropping the granted access. As a result the backend can keep access to the memory page even after it has been freed and then re-used for a different purpose. CVE-2022-23041 netfront will fail a BUG_ON() assertion if it fails to revoke access in the rx path. This will result in a Denial of Service (DoS) situation of the guest which can be triggered by the backend.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008",
"CSAFPID-0009",
"CSAFPID-0010",
"CSAFPID-0011",
"CSAFPID-0012",
"CSAFPID-0013",
"CSAFPID-0014",
"CSAFPID-0015",
"CSAFPID-0016",
"CSAFPID-0017",
"CSAFPID-0018",
"CSAFPID-0019",
"CSAFPID-0020"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V7.2 or later version",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008",
"CSAFPID-0009",
"CSAFPID-0010",
"CSAFPID-0011",
"CSAFPID-0012",
"CSAFPID-0013",
"CSAFPID-0014",
"CSAFPID-0015",
"CSAFPID-0016",
"CSAFPID-0017",
"CSAFPID-0018",
"CSAFPID-0019",
"CSAFPID-0020"
],
"url": "https://support.industry.siemens.com/cs/document/109817007/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.0,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008",
"CSAFPID-0009",
"CSAFPID-0010",
"CSAFPID-0011",
"CSAFPID-0012",
"CSAFPID-0013",
"CSAFPID-0014",
"CSAFPID-0015",
"CSAFPID-0016",
"CSAFPID-0017",
"CSAFPID-0018",
"CSAFPID-0019",
"CSAFPID-0020"
]
}
],
"title": "CVE-2022-23039"
},
{
"cve": "CVE-2022-23040",
"cwe": {
"id": "CWE-362",
"name": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)"
},
"notes": [
{
"category": "summary",
"text": "Linux PV device frontends vulnerable to attacks by backends [This CNA information record relates to multiple CVEs; the text explains which aspects/vulnerabilities correspond to which CVE.] Several Linux PV device frontends are using the grant table interfaces for removing access rights of the backends in ways being subject to race conditions, resulting in potential data leaks, data corruption by malicious backends, and denial of service triggered by malicious backends: blkfront, netfront, scsifront and the gntalloc driver are testing whether a grant reference is still in use. If this is not the case, they assume that a following removal of the granted access will always succeed, which is not true in case the backend has mapped the granted page between those two operations. As a result the backend can keep access to the memory page of the guest no matter how the page will be used after the frontend I/O has finished. The xenbus driver has a similar problem, as it doesn\u0027t check the success of removing the granted access of a shared ring buffer. blkfront: CVE-2022-23036 netfront: CVE-2022-23037 scsifront: CVE-2022-23038 gntalloc: CVE-2022-23039 xenbus: CVE-2022-23040 blkfront, netfront, scsifront, usbfront, dmabuf, xenbus, 9p, kbdfront, and pvcalls are using a functionality to delay freeing a grant reference until it is no longer in use, but the freeing of the related data page is not synchronized with dropping the granted access. As a result the backend can keep access to the memory page even after it has been freed and then re-used for a different purpose. CVE-2022-23041 netfront will fail a BUG_ON() assertion if it fails to revoke access in the rx path. This will result in a Denial of Service (DoS) situation of the guest which can be triggered by the backend.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008",
"CSAFPID-0009",
"CSAFPID-0010",
"CSAFPID-0011",
"CSAFPID-0012",
"CSAFPID-0013",
"CSAFPID-0014",
"CSAFPID-0015",
"CSAFPID-0016",
"CSAFPID-0017",
"CSAFPID-0018",
"CSAFPID-0019",
"CSAFPID-0020"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V7.2 or later version",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008",
"CSAFPID-0009",
"CSAFPID-0010",
"CSAFPID-0011",
"CSAFPID-0012",
"CSAFPID-0013",
"CSAFPID-0014",
"CSAFPID-0015",
"CSAFPID-0016",
"CSAFPID-0017",
"CSAFPID-0018",
"CSAFPID-0019",
"CSAFPID-0020"
],
"url": "https://support.industry.siemens.com/cs/document/109817007/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.0,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008",
"CSAFPID-0009",
"CSAFPID-0010",
"CSAFPID-0011",
"CSAFPID-0012",
"CSAFPID-0013",
"CSAFPID-0014",
"CSAFPID-0015",
"CSAFPID-0016",
"CSAFPID-0017",
"CSAFPID-0018",
"CSAFPID-0019",
"CSAFPID-0020"
]
}
],
"title": "CVE-2022-23040"
},
{
"cve": "CVE-2022-23041",
"cwe": {
"id": "CWE-362",
"name": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)"
},
"notes": [
{
"category": "summary",
"text": "Linux PV device frontends vulnerable to attacks by backends [This CNA information record relates to multiple CVEs; the text explains which aspects/vulnerabilities correspond to which CVE.] Several Linux PV device frontends are using the grant table interfaces for removing access rights of the backends in ways being subject to race conditions, resulting in potential data leaks, data corruption by malicious backends, and denial of service triggered by malicious backends: blkfront, netfront, scsifront and the gntalloc driver are testing whether a grant reference is still in use. If this is not the case, they assume that a following removal of the granted access will always succeed, which is not true in case the backend has mapped the granted page between those two operations. As a result the backend can keep access to the memory page of the guest no matter how the page will be used after the frontend I/O has finished. The xenbus driver has a similar problem, as it doesn\u0027t check the success of removing the granted access of a shared ring buffer. blkfront: CVE-2022-23036 netfront: CVE-2022-23037 scsifront: CVE-2022-23038 gntalloc: CVE-2022-23039 xenbus: CVE-2022-23040 blkfront, netfront, scsifront, usbfront, dmabuf, xenbus, 9p, kbdfront, and pvcalls are using a functionality to delay freeing a grant reference until it is no longer in use, but the freeing of the related data page is not synchronized with dropping the granted access. As a result the backend can keep access to the memory page even after it has been freed and then re-used for a different purpose. CVE-2022-23041 netfront will fail a BUG_ON() assertion if it fails to revoke access in the rx path. This will result in a Denial of Service (DoS) situation of the guest which can be triggered by the backend.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008",
"CSAFPID-0009",
"CSAFPID-0010",
"CSAFPID-0011",
"CSAFPID-0012",
"CSAFPID-0013",
"CSAFPID-0014",
"CSAFPID-0015",
"CSAFPID-0016",
"CSAFPID-0017",
"CSAFPID-0018",
"CSAFPID-0019",
"CSAFPID-0020"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V7.2 or later version",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008",
"CSAFPID-0009",
"CSAFPID-0010",
"CSAFPID-0011",
"CSAFPID-0012",
"CSAFPID-0013",
"CSAFPID-0014",
"CSAFPID-0015",
"CSAFPID-0016",
"CSAFPID-0017",
"CSAFPID-0018",
"CSAFPID-0019",
"CSAFPID-0020"
],
"url": "https://support.industry.siemens.com/cs/document/109817007/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.0,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008",
"CSAFPID-0009",
"CSAFPID-0010",
"CSAFPID-0011",
"CSAFPID-0012",
"CSAFPID-0013",
"CSAFPID-0014",
"CSAFPID-0015",
"CSAFPID-0016",
"CSAFPID-0017",
"CSAFPID-0018",
"CSAFPID-0019",
"CSAFPID-0020"
]
}
],
"title": "CVE-2022-23041"
},
{
"cve": "CVE-2022-23042",
"cwe": {
"id": "CWE-362",
"name": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)"
},
"notes": [
{
"category": "summary",
"text": "Linux PV device frontends vulnerable to attacks by backends [This CNA information record relates to multiple CVEs; the text explains which aspects/vulnerabilities correspond to which CVE.] Several Linux PV device frontends are using the grant table interfaces for removing access rights of the backends in ways being subject to race conditions, resulting in potential data leaks, data corruption by malicious backends, and denial of service triggered by malicious backends: blkfront, netfront, scsifront and the gntalloc driver are testing whether a grant reference is still in use. If this is not the case, they assume that a following removal of the granted access will always succeed, which is not true in case the backend has mapped the granted page between those two operations. As a result the backend can keep access to the memory page of the guest no matter how the page will be used after the frontend I/O has finished. The xenbus driver has a similar problem, as it doesn\u0027t check the success of removing the granted access of a shared ring buffer. blkfront: CVE-2022-23036 netfront: CVE-2022-23037 scsifront: CVE-2022-23038 gntalloc: CVE-2022-23039 xenbus: CVE-2022-23040 blkfront, netfront, scsifront, usbfront, dmabuf, xenbus, 9p, kbdfront, and pvcalls are using a functionality to delay freeing a grant reference until it is no longer in use, but the freeing of the related data page is not synchronized with dropping the granted access. As a result the backend can keep access to the memory page even after it has been freed and then re-used for a different purpose. CVE-2022-23041 netfront will fail a BUG_ON() assertion if it fails to revoke access in the rx path. This will result in a Denial of Service (DoS) situation of the guest which can be triggered by the backend.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008",
"CSAFPID-0009",
"CSAFPID-0010",
"CSAFPID-0011",
"CSAFPID-0012",
"CSAFPID-0013",
"CSAFPID-0014",
"CSAFPID-0015",
"CSAFPID-0016",
"CSAFPID-0017",
"CSAFPID-0018",
"CSAFPID-0019",
"CSAFPID-0020"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V7.2 or later version",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008",
"CSAFPID-0009",
"CSAFPID-0010",
"CSAFPID-0011",
"CSAFPID-0012",
"CSAFPID-0013",
"CSAFPID-0014",
"CSAFPID-0015",
"CSAFPID-0016",
"CSAFPID-0017",
"CSAFPID-0018",
"CSAFPID-0019",
"CSAFPID-0020"
],
"url": "https://support.industry.siemens.com/cs/document/109817007/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.0,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008",
"CSAFPID-0009",
"CSAFPID-0010",
"CSAFPID-0011",
"CSAFPID-0012",
"CSAFPID-0013",
"CSAFPID-0014",
"CSAFPID-0015",
"CSAFPID-0016",
"CSAFPID-0017",
"CSAFPID-0018",
"CSAFPID-0019",
"CSAFPID-0020"
]
}
],
"title": "CVE-2022-23042"
},
{
"cve": "CVE-2022-23308",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"notes": [
{
"category": "summary",
"text": "valid.c in libxml2 before 2.9.13 has a use-after-free of ID and IDREF attributes.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008",
"CSAFPID-0009",
"CSAFPID-0010",
"CSAFPID-0011",
"CSAFPID-0012",
"CSAFPID-0013",
"CSAFPID-0014",
"CSAFPID-0015",
"CSAFPID-0016",
"CSAFPID-0017",
"CSAFPID-0018",
"CSAFPID-0019",
"CSAFPID-0020"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V7.2 or later version",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008",
"CSAFPID-0009",
"CSAFPID-0010",
"CSAFPID-0011",
"CSAFPID-0012",
"CSAFPID-0013",
"CSAFPID-0014",
"CSAFPID-0015",
"CSAFPID-0016",
"CSAFPID-0017",
"CSAFPID-0018",
"CSAFPID-0019",
"CSAFPID-0020"
],
"url": "https://support.industry.siemens.com/cs/document/109817007/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008",
"CSAFPID-0009",
"CSAFPID-0010",
"CSAFPID-0011",
"CSAFPID-0012",
"CSAFPID-0013",
"CSAFPID-0014",
"CSAFPID-0015",
"CSAFPID-0016",
"CSAFPID-0017",
"CSAFPID-0018",
"CSAFPID-0019",
"CSAFPID-0020"
]
}
],
"title": "CVE-2022-23308"
},
{
"cve": "CVE-2022-26490",
"cwe": {
"id": "CWE-120",
"name": "Buffer Copy without Checking Size of Input (\u0027Classic Buffer Overflow\u0027)"
},
"notes": [
{
"category": "summary",
"text": "st21nfca_connectivity_event_received in drivers/nfc/st21nfca/se.c in the Linux kernel through 5.16.12 has EVT_TRANSACTION buffer overflows because of untrusted length parameters.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008",
"CSAFPID-0009",
"CSAFPID-0010",
"CSAFPID-0011",
"CSAFPID-0012",
"CSAFPID-0013",
"CSAFPID-0014",
"CSAFPID-0015",
"CSAFPID-0016",
"CSAFPID-0017",
"CSAFPID-0018",
"CSAFPID-0019",
"CSAFPID-0020"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V7.2 or later version",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008",
"CSAFPID-0009",
"CSAFPID-0010",
"CSAFPID-0011",
"CSAFPID-0012",
"CSAFPID-0013",
"CSAFPID-0014",
"CSAFPID-0015",
"CSAFPID-0016",
"CSAFPID-0017",
"CSAFPID-0018",
"CSAFPID-0019",
"CSAFPID-0020"
],
"url": "https://support.industry.siemens.com/cs/document/109817007/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008",
"CSAFPID-0009",
"CSAFPID-0010",
"CSAFPID-0011",
"CSAFPID-0012",
"CSAFPID-0013",
"CSAFPID-0014",
"CSAFPID-0015",
"CSAFPID-0016",
"CSAFPID-0017",
"CSAFPID-0018",
"CSAFPID-0019",
"CSAFPID-0020"
]
}
],
"title": "CVE-2022-26490"
},
{
"cve": "CVE-2022-28356",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel before 5.17.1, a refcount leak bug was found in net/llc/af_llc.c.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008",
"CSAFPID-0009",
"CSAFPID-0010",
"CSAFPID-0011",
"CSAFPID-0012",
"CSAFPID-0013",
"CSAFPID-0014",
"CSAFPID-0015",
"CSAFPID-0016",
"CSAFPID-0017",
"CSAFPID-0018",
"CSAFPID-0019",
"CSAFPID-0020"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V7.2 or later version",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008",
"CSAFPID-0009",
"CSAFPID-0010",
"CSAFPID-0011",
"CSAFPID-0012",
"CSAFPID-0013",
"CSAFPID-0014",
"CSAFPID-0015",
"CSAFPID-0016",
"CSAFPID-0017",
"CSAFPID-0018",
"CSAFPID-0019",
"CSAFPID-0020"
],
"url": "https://support.industry.siemens.com/cs/document/109817007/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008",
"CSAFPID-0009",
"CSAFPID-0010",
"CSAFPID-0011",
"CSAFPID-0012",
"CSAFPID-0013",
"CSAFPID-0014",
"CSAFPID-0015",
"CSAFPID-0016",
"CSAFPID-0017",
"CSAFPID-0018",
"CSAFPID-0019",
"CSAFPID-0020"
]
}
],
"title": "CVE-2022-28356"
},
{
"cve": "CVE-2022-28390",
"cwe": {
"id": "CWE-415",
"name": "Double Free"
},
"notes": [
{
"category": "summary",
"text": "ems_usb_start_xmit in drivers/net/can/usb/ems_usb.c in the Linux kernel through 5.17.1 has a double free.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008",
"CSAFPID-0009",
"CSAFPID-0010",
"CSAFPID-0011",
"CSAFPID-0012",
"CSAFPID-0013",
"CSAFPID-0014",
"CSAFPID-0015",
"CSAFPID-0016",
"CSAFPID-0017",
"CSAFPID-0018",
"CSAFPID-0019",
"CSAFPID-0020"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V7.2 or later version",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008",
"CSAFPID-0009",
"CSAFPID-0010",
"CSAFPID-0011",
"CSAFPID-0012",
"CSAFPID-0013",
"CSAFPID-0014",
"CSAFPID-0015",
"CSAFPID-0016",
"CSAFPID-0017",
"CSAFPID-0018",
"CSAFPID-0019",
"CSAFPID-0020"
],
"url": "https://support.industry.siemens.com/cs/document/109817007/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008",
"CSAFPID-0009",
"CSAFPID-0010",
"CSAFPID-0011",
"CSAFPID-0012",
"CSAFPID-0013",
"CSAFPID-0014",
"CSAFPID-0015",
"CSAFPID-0016",
"CSAFPID-0017",
"CSAFPID-0018",
"CSAFPID-0019",
"CSAFPID-0020"
]
}
],
"title": "CVE-2022-28390"
},
{
"cve": "CVE-2022-30065",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"notes": [
{
"category": "summary",
"text": "A use-after-free in Busybox 1.35-x\u0027s awk applet leads to denial of service and possibly code execution when processing a crafted awk pattern in the copyvar function.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008",
"CSAFPID-0009",
"CSAFPID-0010",
"CSAFPID-0011",
"CSAFPID-0012",
"CSAFPID-0013",
"CSAFPID-0014",
"CSAFPID-0015",
"CSAFPID-0016",
"CSAFPID-0017",
"CSAFPID-0018",
"CSAFPID-0019",
"CSAFPID-0020"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V7.2 or later version",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008",
"CSAFPID-0009",
"CSAFPID-0010",
"CSAFPID-0011",
"CSAFPID-0012",
"CSAFPID-0013",
"CSAFPID-0014",
"CSAFPID-0015",
"CSAFPID-0016",
"CSAFPID-0017",
"CSAFPID-0018",
"CSAFPID-0019",
"CSAFPID-0020"
],
"url": "https://support.industry.siemens.com/cs/document/109817007/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008",
"CSAFPID-0009",
"CSAFPID-0010",
"CSAFPID-0011",
"CSAFPID-0012",
"CSAFPID-0013",
"CSAFPID-0014",
"CSAFPID-0015",
"CSAFPID-0016",
"CSAFPID-0017",
"CSAFPID-0018",
"CSAFPID-0019",
"CSAFPID-0020"
]
}
],
"title": "CVE-2022-30065"
},
{
"cve": "CVE-2022-30594",
"cwe": {
"id": "CWE-863",
"name": "Incorrect Authorization"
},
"notes": [
{
"category": "summary",
"text": "The Linux kernel before 5.17.2 mishandles seccomp permissions. The PTRACE_SEIZE code path allows attackers to bypass intended restrictions on setting the PT_SUSPEND_SECCOMP flag.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008",
"CSAFPID-0009",
"CSAFPID-0010",
"CSAFPID-0011",
"CSAFPID-0012",
"CSAFPID-0013",
"CSAFPID-0014",
"CSAFPID-0015",
"CSAFPID-0016",
"CSAFPID-0017",
"CSAFPID-0018",
"CSAFPID-0019",
"CSAFPID-0020"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V7.2 or later version",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008",
"CSAFPID-0009",
"CSAFPID-0010",
"CSAFPID-0011",
"CSAFPID-0012",
"CSAFPID-0013",
"CSAFPID-0014",
"CSAFPID-0015",
"CSAFPID-0016",
"CSAFPID-0017",
"CSAFPID-0018",
"CSAFPID-0019",
"CSAFPID-0020"
],
"url": "https://support.industry.siemens.com/cs/document/109817007/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008",
"CSAFPID-0009",
"CSAFPID-0010",
"CSAFPID-0011",
"CSAFPID-0012",
"CSAFPID-0013",
"CSAFPID-0014",
"CSAFPID-0015",
"CSAFPID-0016",
"CSAFPID-0017",
"CSAFPID-0018",
"CSAFPID-0019",
"CSAFPID-0020"
]
}
],
"title": "CVE-2022-30594"
},
{
"cve": "CVE-2022-32205",
"cwe": {
"id": "CWE-770",
"name": "Allocation of Resources Without Limits or Throttling"
},
"notes": [
{
"category": "summary",
"text": "A malicious server can serve excessive amounts of \"Set-Cookie:\" headers in a HTTP response to curl and curl \u003c 7.84.0 stores all of them. A sufficiently large amount of (big) cookies make subsequent HTTP requests to this, or other servers to which the cookies match, create requests that become larger than the threshold that curl uses internally to avoid sending crazy large requests (1048576 bytes) and instead returns an error.This denial state might remain for as long as the same cookies are kept, match and haven\u0027t expired. Due to cookie matching rules, a server on \"foo.example.com\" can set cookies that also would match for \"bar.example.com\", making it it possible for a \"sister server\" to effectively cause a denial of service for a sibling site on the same second level domain using this method.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008",
"CSAFPID-0009",
"CSAFPID-0010",
"CSAFPID-0011",
"CSAFPID-0012",
"CSAFPID-0013",
"CSAFPID-0014",
"CSAFPID-0015",
"CSAFPID-0016",
"CSAFPID-0017",
"CSAFPID-0018",
"CSAFPID-0019",
"CSAFPID-0020"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V7.2 or later version",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008",
"CSAFPID-0009",
"CSAFPID-0010",
"CSAFPID-0011",
"CSAFPID-0012",
"CSAFPID-0013",
"CSAFPID-0014",
"CSAFPID-0015",
"CSAFPID-0016",
"CSAFPID-0017",
"CSAFPID-0018",
"CSAFPID-0019",
"CSAFPID-0020"
],
"url": "https://support.industry.siemens.com/cs/document/109817007/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008",
"CSAFPID-0009",
"CSAFPID-0010",
"CSAFPID-0011",
"CSAFPID-0012",
"CSAFPID-0013",
"CSAFPID-0014",
"CSAFPID-0015",
"CSAFPID-0016",
"CSAFPID-0017",
"CSAFPID-0018",
"CSAFPID-0019",
"CSAFPID-0020"
]
}
],
"title": "CVE-2022-32205"
},
{
"cve": "CVE-2022-32206",
"cwe": {
"id": "CWE-770",
"name": "Allocation of Resources Without Limits or Throttling"
},
"notes": [
{
"category": "summary",
"text": "curl \u003c 7.84.0 supports \"chained\" HTTP compression algorithms, meaning that a serverresponse can be compressed multiple times and potentially with different algorithms. The number of acceptable \"links\" in this \"decompression chain\" was unbounded, allowing a malicious server to insert a virtually unlimited number of compression steps.The use of such a decompression chain could result in a \"malloc bomb\", makingcurl end up spending enormous amounts of allocated heap memory, or trying toand returning out of memory errors.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008",
"CSAFPID-0009",
"CSAFPID-0010",
"CSAFPID-0011",
"CSAFPID-0012",
"CSAFPID-0013",
"CSAFPID-0014",
"CSAFPID-0015",
"CSAFPID-0016",
"CSAFPID-0017",
"CSAFPID-0018",
"CSAFPID-0019",
"CSAFPID-0020"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V7.2 or later version",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008",
"CSAFPID-0009",
"CSAFPID-0010",
"CSAFPID-0011",
"CSAFPID-0012",
"CSAFPID-0013",
"CSAFPID-0014",
"CSAFPID-0015",
"CSAFPID-0016",
"CSAFPID-0017",
"CSAFPID-0018",
"CSAFPID-0019",
"CSAFPID-0020"
],
"url": "https://support.industry.siemens.com/cs/document/109817007/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008",
"CSAFPID-0009",
"CSAFPID-0010",
"CSAFPID-0011",
"CSAFPID-0012",
"CSAFPID-0013",
"CSAFPID-0014",
"CSAFPID-0015",
"CSAFPID-0016",
"CSAFPID-0017",
"CSAFPID-0018",
"CSAFPID-0019",
"CSAFPID-0020"
]
}
],
"title": "CVE-2022-32206"
},
{
"cve": "CVE-2022-32207",
"cwe": {
"id": "CWE-276",
"name": "Incorrect Default Permissions"
},
"notes": [
{
"category": "summary",
"text": "When curl \u003c 7.84.0 saves cookies, alt-svc and hsts data to local files, it makes the operation atomic by finalizing the operation with a rename from a temporary name to the final target file name.In that rename operation, it might accidentally *widen* the permissions for the target file, leaving the updated file accessible to more users than intended.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008",
"CSAFPID-0009",
"CSAFPID-0010",
"CSAFPID-0011",
"CSAFPID-0012",
"CSAFPID-0013",
"CSAFPID-0014",
"CSAFPID-0015",
"CSAFPID-0016",
"CSAFPID-0017",
"CSAFPID-0018",
"CSAFPID-0019",
"CSAFPID-0020"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V7.2 or later version",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008",
"CSAFPID-0009",
"CSAFPID-0010",
"CSAFPID-0011",
"CSAFPID-0012",
"CSAFPID-0013",
"CSAFPID-0014",
"CSAFPID-0015",
"CSAFPID-0016",
"CSAFPID-0017",
"CSAFPID-0018",
"CSAFPID-0019",
"CSAFPID-0020"
],
"url": "https://support.industry.siemens.com/cs/document/109817007/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008",
"CSAFPID-0009",
"CSAFPID-0010",
"CSAFPID-0011",
"CSAFPID-0012",
"CSAFPID-0013",
"CSAFPID-0014",
"CSAFPID-0015",
"CSAFPID-0016",
"CSAFPID-0017",
"CSAFPID-0018",
"CSAFPID-0019",
"CSAFPID-0020"
]
}
],
"title": "CVE-2022-32207"
},
{
"cve": "CVE-2022-32208",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"notes": [
{
"category": "summary",
"text": "When curl \u003c 7.84.0 does FTP transfers secured by krb5, it handles message verification failures wrongly. This flaw makes it possible for a Man-In-The-Middle attack to go unnoticed and even allows it to inject data to the client.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008",
"CSAFPID-0009",
"CSAFPID-0010",
"CSAFPID-0011",
"CSAFPID-0012",
"CSAFPID-0013",
"CSAFPID-0014",
"CSAFPID-0015",
"CSAFPID-0016",
"CSAFPID-0017",
"CSAFPID-0018",
"CSAFPID-0019",
"CSAFPID-0020"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V7.2 or later version",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008",
"CSAFPID-0009",
"CSAFPID-0010",
"CSAFPID-0011",
"CSAFPID-0012",
"CSAFPID-0013",
"CSAFPID-0014",
"CSAFPID-0015",
"CSAFPID-0016",
"CSAFPID-0017",
"CSAFPID-0018",
"CSAFPID-0019",
"CSAFPID-0020"
],
"url": "https://support.industry.siemens.com/cs/document/109817007/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008",
"CSAFPID-0009",
"CSAFPID-0010",
"CSAFPID-0011",
"CSAFPID-0012",
"CSAFPID-0013",
"CSAFPID-0014",
"CSAFPID-0015",
"CSAFPID-0016",
"CSAFPID-0017",
"CSAFPID-0018",
"CSAFPID-0019",
"CSAFPID-0020"
]
}
],
"title": "CVE-2022-32208"
},
{
"cve": "CVE-2022-32296",
"cwe": {
"id": "CWE-203",
"name": "Observable Discrepancy"
},
"notes": [
{
"category": "summary",
"text": "The Linux kernel before 5.17.9 allows TCP servers to identify clients by observing what source ports are used. This occurs because of use of Algorithm 4 (\"Double-Hash Port Selection Algorithm\") of RFC 6056.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008",
"CSAFPID-0009",
"CSAFPID-0010",
"CSAFPID-0011",
"CSAFPID-0012",
"CSAFPID-0013",
"CSAFPID-0014",
"CSAFPID-0015",
"CSAFPID-0016",
"CSAFPID-0017",
"CSAFPID-0018",
"CSAFPID-0019",
"CSAFPID-0020"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V7.2 or later version",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008",
"CSAFPID-0009",
"CSAFPID-0010",
"CSAFPID-0011",
"CSAFPID-0012",
"CSAFPID-0013",
"CSAFPID-0014",
"CSAFPID-0015",
"CSAFPID-0016",
"CSAFPID-0017",
"CSAFPID-0018",
"CSAFPID-0019",
"CSAFPID-0020"
],
"url": "https://support.industry.siemens.com/cs/document/109817007/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.3,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008",
"CSAFPID-0009",
"CSAFPID-0010",
"CSAFPID-0011",
"CSAFPID-0012",
"CSAFPID-0013",
"CSAFPID-0014",
"CSAFPID-0015",
"CSAFPID-0016",
"CSAFPID-0017",
"CSAFPID-0018",
"CSAFPID-0019",
"CSAFPID-0020"
]
}
],
"title": "CVE-2022-32296"
},
{
"cve": "CVE-2022-32981",
"cwe": {
"id": "CWE-120",
"name": "Buffer Copy without Checking Size of Input (\u0027Classic Buffer Overflow\u0027)"
},
"notes": [
{
"category": "summary",
"text": "An issue was discovered in the Linux kernel through 5.18.3 on powerpc 32-bit platforms. There is a buffer overflow in ptrace PEEKUSER and POKEUSER (aka PEEKUSR and POKEUSR) when accessing floating point registers.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008",
"CSAFPID-0009",
"CSAFPID-0010",
"CSAFPID-0011",
"CSAFPID-0012",
"CSAFPID-0013",
"CSAFPID-0014",
"CSAFPID-0015",
"CSAFPID-0016",
"CSAFPID-0017",
"CSAFPID-0018",
"CSAFPID-0019",
"CSAFPID-0020"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V7.2 or later version",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008",
"CSAFPID-0009",
"CSAFPID-0010",
"CSAFPID-0011",
"CSAFPID-0012",
"CSAFPID-0013",
"CSAFPID-0014",
"CSAFPID-0015",
"CSAFPID-0016",
"CSAFPID-0017",
"CSAFPID-0018",
"CSAFPID-0019",
"CSAFPID-0020"
],
"url": "https://support.industry.siemens.com/cs/document/109817007/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008",
"CSAFPID-0009",
"CSAFPID-0010",
"CSAFPID-0011",
"CSAFPID-0012",
"CSAFPID-0013",
"CSAFPID-0014",
"CSAFPID-0015",
"CSAFPID-0016",
"CSAFPID-0017",
"CSAFPID-0018",
"CSAFPID-0019",
"CSAFPID-0020"
]
}
],
"title": "CVE-2022-32981"
},
{
"cve": "CVE-2022-33981",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"notes": [
{
"category": "summary",
"text": "drivers/block/floppy.c in the Linux kernel before 5.17.6 is vulnerable to a denial of service, because of a concurrency use-after-free flaw after deallocating raw_cmd in the raw_cmd_ioctl function.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008",
"CSAFPID-0009",
"CSAFPID-0010",
"CSAFPID-0011",
"CSAFPID-0012",
"CSAFPID-0013",
"CSAFPID-0014",
"CSAFPID-0015",
"CSAFPID-0016",
"CSAFPID-0017",
"CSAFPID-0018",
"CSAFPID-0019",
"CSAFPID-0020"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V7.2 or later version",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008",
"CSAFPID-0009",
"CSAFPID-0010",
"CSAFPID-0011",
"CSAFPID-0012",
"CSAFPID-0013",
"CSAFPID-0014",
"CSAFPID-0015",
"CSAFPID-0016",
"CSAFPID-0017",
"CSAFPID-0018",
"CSAFPID-0019",
"CSAFPID-0020"
],
"url": "https://support.industry.siemens.com/cs/document/109817007/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.3,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008",
"CSAFPID-0009",
"CSAFPID-0010",
"CSAFPID-0011",
"CSAFPID-0012",
"CSAFPID-0013",
"CSAFPID-0014",
"CSAFPID-0015",
"CSAFPID-0016",
"CSAFPID-0017",
"CSAFPID-0018",
"CSAFPID-0019",
"CSAFPID-0020"
]
}
],
"title": "CVE-2022-33981"
},
{
"cve": "CVE-2022-35252",
"cwe": {
"id": "CWE-1286",
"name": "Improper Validation of Syntactic Correctness of Input"
},
"notes": [
{
"category": "summary",
"text": "When curl is used to retrieve and parse cookies from a HTTP(S) server, itaccepts cookies using control codes that when later are sent back to a HTTPserver might make the server return 400 responses. Effectively allowing a\"sister site\" to deny service to all siblings.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008",
"CSAFPID-0009",
"CSAFPID-0010",
"CSAFPID-0011",
"CSAFPID-0012",
"CSAFPID-0013",
"CSAFPID-0014",
"CSAFPID-0015",
"CSAFPID-0016",
"CSAFPID-0017",
"CSAFPID-0018",
"CSAFPID-0019",
"CSAFPID-0020"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V7.2 or later version",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008",
"CSAFPID-0009",
"CSAFPID-0010",
"CSAFPID-0011",
"CSAFPID-0012",
"CSAFPID-0013",
"CSAFPID-0014",
"CSAFPID-0015",
"CSAFPID-0016",
"CSAFPID-0017",
"CSAFPID-0018",
"CSAFPID-0019",
"CSAFPID-0020"
],
"url": "https://support.industry.siemens.com/cs/document/109817007/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008",
"CSAFPID-0009",
"CSAFPID-0010",
"CSAFPID-0011",
"CSAFPID-0012",
"CSAFPID-0013",
"CSAFPID-0014",
"CSAFPID-0015",
"CSAFPID-0016",
"CSAFPID-0017",
"CSAFPID-0018",
"CSAFPID-0019",
"CSAFPID-0020"
]
}
],
"title": "CVE-2022-35252"
},
{
"cve": "CVE-2022-36879",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "summary",
"text": "An issue was discovered in the Linux kernel through 5.18.14. xfrm_expand_policies in net/xfrm/xfrm_policy.c can cause a refcount to be dropped twice.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008",
"CSAFPID-0009",
"CSAFPID-0010",
"CSAFPID-0011",
"CSAFPID-0012",
"CSAFPID-0013",
"CSAFPID-0014",
"CSAFPID-0015",
"CSAFPID-0016",
"CSAFPID-0017",
"CSAFPID-0018",
"CSAFPID-0019",
"CSAFPID-0020"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V7.2 or later version",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008",
"CSAFPID-0009",
"CSAFPID-0010",
"CSAFPID-0011",
"CSAFPID-0012",
"CSAFPID-0013",
"CSAFPID-0014",
"CSAFPID-0015",
"CSAFPID-0016",
"CSAFPID-0017",
"CSAFPID-0018",
"CSAFPID-0019",
"CSAFPID-0020"
],
"url": "https://support.industry.siemens.com/cs/document/109817007/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008",
"CSAFPID-0009",
"CSAFPID-0010",
"CSAFPID-0011",
"CSAFPID-0012",
"CSAFPID-0013",
"CSAFPID-0014",
"CSAFPID-0015",
"CSAFPID-0016",
"CSAFPID-0017",
"CSAFPID-0018",
"CSAFPID-0019",
"CSAFPID-0020"
]
}
],
"title": "CVE-2022-36879"
},
{
"cve": "CVE-2022-36946",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "summary",
"text": "nfqnl_mangle in net/netfilter/nfnetlink_queue.c in the Linux kernel through 5.18.14 allows remote attackers to cause a denial of service (panic) because, in the case of an nf_queue verdict with a one-byte nfta_payload attribute, an skb_pull can encounter a negative skb-\u003elen.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008",
"CSAFPID-0009",
"CSAFPID-0010",
"CSAFPID-0011",
"CSAFPID-0012",
"CSAFPID-0013",
"CSAFPID-0014",
"CSAFPID-0015",
"CSAFPID-0016",
"CSAFPID-0017",
"CSAFPID-0018",
"CSAFPID-0019",
"CSAFPID-0020"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V7.2 or later version",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008",
"CSAFPID-0009",
"CSAFPID-0010",
"CSAFPID-0011",
"CSAFPID-0012",
"CSAFPID-0013",
"CSAFPID-0014",
"CSAFPID-0015",
"CSAFPID-0016",
"CSAFPID-0017",
"CSAFPID-0018",
"CSAFPID-0019",
"CSAFPID-0020"
],
"url": "https://support.industry.siemens.com/cs/document/109817007/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008",
"CSAFPID-0009",
"CSAFPID-0010",
"CSAFPID-0011",
"CSAFPID-0012",
"CSAFPID-0013",
"CSAFPID-0014",
"CSAFPID-0015",
"CSAFPID-0016",
"CSAFPID-0017",
"CSAFPID-0018",
"CSAFPID-0019",
"CSAFPID-0020"
]
}
],
"title": "CVE-2022-36946"
}
]
}
ICSA-23-166-12
Vulnerability from csaf_cisa - Published: 2023-06-13 00:00 - Updated: 2023-06-14 00:00Notes
{
"document": {
"acknowledgments": [
{
"organization": "Siemens ProductCERT",
"summary": "reporting these vulnerabilities to CISA."
}
],
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Disclosure is not limited",
"tlp": {
"label": "WHITE",
"url": "https://us-cert.cisa.gov/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "SINAMICS PERFECT HARMONY GH180 is affected by multiple vulnerabilities in the integrated SCALANCE S615 device, as documented in SSA-419740 (\nhttps://cert-portal.siemens.com/productcert/html/ssa-419740.html).\nSiemens recommends to update the firmware of the integrated SCALANCE S615 device to the latest version. Siemens recommends specific countermeasures for products where the firmware update is not, or not yet applied.\n\nAdditional considerations regarding the specific impact of the vulnerabilities to SINAMICS MV products can be found in the chapter \"Additional Information\".",
"title": "Summary"
},
{
"category": "general",
"text": "As a general security measure, Siemens strongly recommends to protect network access to devices with appropriate mechanisms. In order to operate the devices in a protected IT environment, Siemens recommends to configure the environment according to Siemens\u0027 operational guidelines for Industrial Security (Download: \nhttps://www.siemens.com/cert/operational-guidelines-industrial-security), and to follow the recommendations in the product manuals.\nAdditional information on Industrial Security by Siemens can be found at: https://www.siemens.com/industrialsecurity",
"title": "General Recommendations"
},
{
"category": "general",
"text": "For further inquiries on security vulnerabilities in Siemens products and solutions, please contact the Siemens ProductCERT: https://www.siemens.com/cert/advisories",
"title": "Additional Resources"
},
{
"category": "legal_disclaimer",
"text": "Siemens Security Advisories are subject to the terms and conditions contained in Siemens\u0027 underlying license terms or other applicable agreements previously agreed to with Siemens (hereinafter \"License Terms\"). To the extent applicable to information, software or documentation made available in or through a Siemens Security Advisory, the Terms of Use of Siemens\u0027 Global Website (https://www.siemens.com/terms_of_use, hereinafter \"Terms of Use\"), in particular Sections 8-10 of the Terms of Use, shall apply additionally. In case of conflicts, the License Terms shall prevail over the Terms of Use.",
"title": "Terms of Use"
},
{
"category": "legal_disclaimer",
"text": "All information products included in https://us-cert.cisa.gov/ics are provided \"as is\" for informational purposes only. The Department of Homeland Security (DHS) does not provide any warranties of any kind regarding any information contained within. DHS does not endorse any commercial product or service, referenced in this product or otherwise. Further dissemination of this product is governed by the Traffic Light Protocol (TLP) marking in the header. For more information about TLP, see https://us-cert.cisa.gov/tlp/.",
"title": "Legal Notice"
},
{
"category": "other",
"text": "This CISA CSAF advisory was converted from Siemens ProductCERT\u0027s CSAF advisory.",
"title": "Advisory Conversion Disclaimer"
},
{
"category": "other",
"text": "Multiple",
"title": "Critical infrastructure sectors"
},
{
"category": "other",
"text": "Worldwide",
"title": "Countries/areas deployed"
},
{
"category": "other",
"text": "Germany",
"title": "Company headquarters location"
},
{
"category": "general",
"text": "CISA recommends users take defensive measures to minimize the exploitation risk of this vulnerability.",
"title": "Recommended Practices"
},
{
"category": "general",
"text": "Minimize network exposure for all control system devices and/or systems, and ensure they are not accessible from the internet.",
"title": "Recommended Practices"
},
{
"category": "general",
"text": "Locate control system networks and remote devices behind firewalls and isolate them from business networks.",
"title": "Recommended Practices"
},
{
"category": "general",
"text": "When remote access is required, use more secure methods, such as Virtual Private Networks (VPNs), recognizing VPNs may have vulnerabilities and should be updated to the most recent version available. Also recognize VPN is only as secure as its connected devices.",
"title": "Recommended Practices"
},
{
"category": "general",
"text": "CISA reminds organizations to perform proper impact analysis and risk assessment prior to deploying defensive measures.",
"title": "Recommended Practices"
},
{
"category": "general",
"text": "CISA also provides a section for control systems security recommended practices on the ICS webpage on cisa.gov. Several CISA products detailing cyber defense best practices are available for reading and download, including Improving Industrial Control Systems Cybersecurity with Defense-in-Depth Strategies.",
"title": "Recommended Practices"
},
{
"category": "general",
"text": "CISA encourages organizations to implement recommended cybersecurity strategies for proactive defense of ICS assets. Additional mitigation guidance and recommended practices are publicly available on the ICS webpage at cisa.gov in the technical information paper, ICS-TIP-12-146-01B--Targeted Cyber Intrusion Detection and Mitigation Strategies.",
"title": "Recommended Practices"
},
{
"category": "general",
"text": "Organizations observing suspected malicious activity should follow established internal procedures and report findings to CISA for tracking and correlation against other incidents.",
"title": "Recommended Practices"
}
],
"publisher": {
"category": "other",
"contact_details": "central@cisa.dhs.gov",
"name": "CISA",
"namespace": "https://www.cisa.gov/"
},
"references": [
{
"category": "self",
"summary": "SSA-942865: Multiple Vulnerabilities in the Integrated SCALANCE S615 of SINAMICS Medium Voltage Products - CSAF Version",
"url": "https://cert-portal.siemens.com/productcert/csaf/ssa-942865.json"
},
{
"category": "self",
"summary": "SSA-942865: Multiple Vulnerabilities in the Integrated SCALANCE S615 of SINAMICS Medium Voltage Products - HTML Version",
"url": "https://cert-portal.siemens.com/productcert/html/ssa-942865.html"
},
{
"category": "self",
"summary": "SSA-942865: Multiple Vulnerabilities in the Integrated SCALANCE S615 of SINAMICS Medium Voltage Products - PDF Version",
"url": "https://cert-portal.siemens.com/productcert/pdf/ssa-942865.pdf"
},
{
"category": "self",
"summary": "SSA-942865: Multiple Vulnerabilities in the Integrated SCALANCE S615 of SINAMICS Medium Voltage Products - TXT Version",
"url": "https://cert-portal.siemens.com/productcert/txt/ssa-942865.txt"
},
{
"category": "self",
"summary": "ICS Advisory ICSA-23-166-12 JSON",
"url": "https://raw.githubusercontent.com/cisagov/CSAF/develop/csaf_files/OT/white/2023/icsa-23-166-12.json"
},
{
"category": "self",
"summary": "ICS Advisory ICSA-23-166-12 - Web Version",
"url": "https://www.cisa.gov/news-events/ics-advisories/icsa-23-166-12"
},
{
"category": "external",
"summary": "Recommended Practices",
"url": "https://www.cisa.gov/uscert/ics/alerts/ICS-ALERT-10-301-01"
},
{
"category": "external",
"summary": "Recommended Practices",
"url": "https://www.cisa.gov/resources-tools/resources/ics-recommended-practices"
},
{
"category": "external",
"summary": "Recommended Practices",
"url": "https://www.cisa.gov/topics/industrial-control-systems"
},
{
"category": "external",
"summary": "Recommended Practices",
"url": "https://us-cert.cisa.gov/sites/default/files/recommended_practices/NCCIC_ICS-CERT_Defense_in_Depth_2016_S508C.pdf"
},
{
"category": "external",
"summary": "Recommended Practices",
"url": "https://www.cisa.gov/sites/default/files/publications/Cybersecurity_Best_Practices_for_Industrial_Control_Systems.pdf"
},
{
"category": "external",
"summary": "Recommended Practices",
"url": "https://www.cisa.gov/uscert/ics/tips/ICS-TIP-12-146-01B"
}
],
"title": "Siemens SINAMICS Medium Voltage Products",
"tracking": {
"current_release_date": "2023-06-14T00:00:00.000000Z",
"generator": {
"engine": {
"name": "CISA CSAF Generator",
"version": "1.0.0"
}
},
"id": "ICSA-23-166-12",
"initial_release_date": "2023-06-13T00:00:00.000000Z",
"revision_history": [
{
"date": "2023-06-13T00:00:00.000000Z",
"legacy_version": "1.0",
"number": "1",
"summary": "Publication Date"
},
{
"date": "2023-06-14T00:00:00.000000Z",
"legacy_version": "1.1",
"number": "2",
"summary": "Removed not affected products SINAMICS GL150 and SINAMICS SL150"
}
],
"status": "final",
"version": "2"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/*",
"product": {
"name": "SINAMICS PERFECT HARMONY GH180 6SR5",
"product_id": "CSAFPID-0001"
}
}
],
"category": "product_name",
"name": "SINAMICS PERFECT HARMONY GH180 6SR5"
}
],
"category": "vendor",
"name": "Siemens"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2018-25032",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"notes": [
{
"category": "summary",
"text": "zlib before 1.2.12 allows memory corruption when deflating (i.e., when compressing) if the input has many distant matches.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Restrict physical access to the affected drives, also to their Ethernet Port included on the front of the control door",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "mitigation",
"details": "Disconnect any direct network connection to the integrated SCALANCE S615 device",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "vendor_fix",
"details": "Update the firmware of the integrated SCALANCE S615 device to V7.2 or later version",
"product_ids": [
"CSAFPID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
],
"title": "CVE-2018-25032"
},
{
"cve": "CVE-2021-42374",
"cwe": {
"id": "CWE-125",
"name": "Out-of-bounds Read"
},
"notes": [
{
"category": "summary",
"text": "An out-of-bounds heap read in Busybox\u0027s unlzma applet leads to information leak and denial of service when crafted LZMA-compressed input is decompressed. This can be triggered by any applet/format that internally supports LZMA compression.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Restrict physical access to the affected drives, also to their Ethernet Port included on the front of the control door",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "mitigation",
"details": "Disconnect any direct network connection to the integrated SCALANCE S615 device",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "vendor_fix",
"details": "Update the firmware of the integrated SCALANCE S615 device to V7.2 or later version",
"product_ids": [
"CSAFPID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
],
"title": "CVE-2021-42374"
},
{
"cve": "CVE-2021-42378",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"notes": [
{
"category": "summary",
"text": "A use-after-free in Busybox\u0027s awk applet leads to denial of service and possibly code execution when processing a crafted awk pattern in the getvar_i function.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Restrict physical access to the affected drives, also to their Ethernet Port included on the front of the control door",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "mitigation",
"details": "Disconnect any direct network connection to the integrated SCALANCE S615 device",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "vendor_fix",
"details": "Update the firmware of the integrated SCALANCE S615 device to V7.2 or later version",
"product_ids": [
"CSAFPID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.6,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
],
"title": "CVE-2021-42378"
},
{
"cve": "CVE-2021-42379",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"notes": [
{
"category": "summary",
"text": "A use-after-free in Busybox\u0027s awk applet leads to denial of service and possibly code execution when processing a crafted awk pattern in the next_input_file function.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Restrict physical access to the affected drives, also to their Ethernet Port included on the front of the control door",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "mitigation",
"details": "Disconnect any direct network connection to the integrated SCALANCE S615 device",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "vendor_fix",
"details": "Update the firmware of the integrated SCALANCE S615 device to V7.2 or later version",
"product_ids": [
"CSAFPID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.6,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
],
"title": "CVE-2021-42379"
},
{
"cve": "CVE-2021-42380",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"notes": [
{
"category": "summary",
"text": "A use-after-free in awk leads to denial of service and possibly code execution when processing a crafted awk pattern in the clrvar function.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Restrict physical access to the affected drives, also to their Ethernet Port included on the front of the control door",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "mitigation",
"details": "Disconnect any direct network connection to the integrated SCALANCE S615 device",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "vendor_fix",
"details": "Update the firmware of the integrated SCALANCE S615 device to V7.2 or later version",
"product_ids": [
"CSAFPID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.6,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
],
"title": "CVE-2021-42380"
},
{
"cve": "CVE-2021-42381",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"notes": [
{
"category": "summary",
"text": "A use-after-free in awk leads to denial of service and possibly code execution when processing a crafted awk pattern in the hash_init function.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Restrict physical access to the affected drives, also to their Ethernet Port included on the front of the control door",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "mitigation",
"details": "Disconnect any direct network connection to the integrated SCALANCE S615 device",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "vendor_fix",
"details": "Update the firmware of the integrated SCALANCE S615 device to V7.2 or later version",
"product_ids": [
"CSAFPID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.6,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
],
"title": "CVE-2021-42381"
},
{
"cve": "CVE-2021-42382",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"notes": [
{
"category": "summary",
"text": "A use-after-free in awk leads to denial of service and possibly code execution when processing a crafted awk pattern in the getvar_s function.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Restrict physical access to the affected drives, also to their Ethernet Port included on the front of the control door",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "mitigation",
"details": "Disconnect any direct network connection to the integrated SCALANCE S615 device",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "vendor_fix",
"details": "Update the firmware of the integrated SCALANCE S615 device to V7.2 or later version",
"product_ids": [
"CSAFPID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.6,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
],
"title": "CVE-2021-42382"
},
{
"cve": "CVE-2021-42383",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"notes": [
{
"category": "summary",
"text": "A use-after-free in awk leads to denial of service and possibly code execution when processing a crafted awk pattern in the evaluate function.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Restrict physical access to the affected drives, also to their Ethernet Port included on the front of the control door",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "mitigation",
"details": "Disconnect any direct network connection to the integrated SCALANCE S615 device",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "vendor_fix",
"details": "Update the firmware of the integrated SCALANCE S615 device to V7.2 or later version",
"product_ids": [
"CSAFPID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.6,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
],
"title": "CVE-2021-42383"
},
{
"cve": "CVE-2021-42384",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"notes": [
{
"category": "summary",
"text": "A use-after-free in Busybox\u0027s awk applet leads to denial of service and possibly code execution when processing a crafted awk pattern in the handle_special function.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Restrict physical access to the affected drives, also to their Ethernet Port included on the front of the control door",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "mitigation",
"details": "Disconnect any direct network connection to the integrated SCALANCE S615 device",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "vendor_fix",
"details": "Update the firmware of the integrated SCALANCE S615 device to V7.2 or later version",
"product_ids": [
"CSAFPID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.6,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
],
"title": "CVE-2021-42384"
},
{
"cve": "CVE-2021-42385",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"notes": [
{
"category": "summary",
"text": "A use-after-free in awk leads to denial of service and possibly code execution when processing a crafted awk pattern in the evaluate function.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Restrict physical access to the affected drives, also to their Ethernet Port included on the front of the control door",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "mitigation",
"details": "Disconnect any direct network connection to the integrated SCALANCE S615 device",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "vendor_fix",
"details": "Update the firmware of the integrated SCALANCE S615 device to V7.2 or later version",
"product_ids": [
"CSAFPID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.6,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
],
"title": "CVE-2021-42385"
},
{
"cve": "CVE-2021-42386",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"notes": [
{
"category": "summary",
"text": "A use-after-free in awk leads to denial of service and possibly code execution when processing a crafted awk pattern in the nvalloc function.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Restrict physical access to the affected drives, also to their Ethernet Port included on the front of the control door",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "mitigation",
"details": "Disconnect any direct network connection to the integrated SCALANCE S615 device",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "vendor_fix",
"details": "Update the firmware of the integrated SCALANCE S615 device to V7.2 or later version",
"product_ids": [
"CSAFPID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.6,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
],
"title": "CVE-2021-42386"
},
{
"cve": "CVE-2022-0547",
"cwe": {
"id": "CWE-287",
"name": "Improper Authentication"
},
"notes": [
{
"category": "summary",
"text": "OpenVPN 2.1 until v2.4.12 and v2.5.6 may enable authentication bypass in external authentication plug-ins when more than one of them makes use of deferred authentication replies, which allows an external user to be granted access with only partially correct credentials.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Restrict physical access to the affected drives, also to their Ethernet Port included on the front of the control door",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "mitigation",
"details": "Disconnect any direct network connection to the integrated SCALANCE S615 device",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "vendor_fix",
"details": "Update the firmware of the integrated SCALANCE S615 device to V7.2 or later version",
"product_ids": [
"CSAFPID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
],
"title": "CVE-2022-0547"
},
{
"cve": "CVE-2022-1199",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"notes": [
{
"category": "summary",
"text": "A flaw was found in the Linux kernel. This flaw allows an attacker to crash the Linux kernel by simulating amateur radio from the user space, resulting in a null-ptr-deref vulnerability and a use-after-free vulnerability.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Restrict physical access to the affected drives, also to their Ethernet Port included on the front of the control door",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "mitigation",
"details": "Disconnect any direct network connection to the integrated SCALANCE S615 device",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "vendor_fix",
"details": "Update the firmware of the integrated SCALANCE S615 device to V7.2 or later version",
"product_ids": [
"CSAFPID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
],
"title": "CVE-2022-1199"
},
{
"cve": "CVE-2022-1292",
"cwe": {
"id": "CWE-78",
"name": "Improper Neutralization of Special Elements used in an OS Command (\u0027OS Command Injection\u0027)"
},
"notes": [
{
"category": "summary",
"text": "The c_rehash script does not properly sanitise shell metacharacters to prevent command injection.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Restrict physical access to the affected drives, also to their Ethernet Port included on the front of the control door",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "mitigation",
"details": "Disconnect any direct network connection to the integrated SCALANCE S615 device",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "vendor_fix",
"details": "Update the firmware of the integrated SCALANCE S615 device to V7.2 or later version",
"product_ids": [
"CSAFPID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
],
"title": "CVE-2022-1292"
},
{
"cve": "CVE-2022-1343",
"cwe": {
"id": "CWE-295",
"name": "Improper Certificate Validation"
},
"notes": [
{
"category": "summary",
"text": "Under certain circumstances, the command line OCSP verify function reports successful verification when the verification in fact failed. In this case the incorrect successful response will also be accompanied by error messages showing the failure and contradicting the apparently successful result.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Restrict physical access to the affected drives, also to their Ethernet Port included on the front of the control door",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "mitigation",
"details": "Disconnect any direct network connection to the integrated SCALANCE S615 device",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "vendor_fix",
"details": "Update the firmware of the integrated SCALANCE S615 device to V7.2 or later version",
"product_ids": [
"CSAFPID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
],
"title": "CVE-2022-1343"
},
{
"cve": "CVE-2022-1473",
"cwe": {
"id": "CWE-404",
"name": "Improper Resource Shutdown or Release"
},
"notes": [
{
"category": "summary",
"text": "The used OpenSSL version improperly reuses memory when decoding certificates or keys. This can lead to a process termination and Denial of Service for long lived processes.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Restrict physical access to the affected drives, also to their Ethernet Port included on the front of the control door",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "mitigation",
"details": "Disconnect any direct network connection to the integrated SCALANCE S615 device",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "vendor_fix",
"details": "Update the firmware of the integrated SCALANCE S615 device to V7.2 or later version",
"product_ids": [
"CSAFPID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
],
"title": "CVE-2022-1473"
},
{
"cve": "CVE-2022-23308",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"notes": [
{
"category": "summary",
"text": "valid.c in libxml2 before 2.9.13 has a use-after-free of ID and IDREF attributes.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Restrict physical access to the affected drives, also to their Ethernet Port included on the front of the control door",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "mitigation",
"details": "Disconnect any direct network connection to the integrated SCALANCE S615 device",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "vendor_fix",
"details": "Update the firmware of the integrated SCALANCE S615 device to V7.2 or later version",
"product_ids": [
"CSAFPID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
],
"title": "CVE-2022-23308"
},
{
"cve": "CVE-2022-32205",
"cwe": {
"id": "CWE-770",
"name": "Allocation of Resources Without Limits or Throttling"
},
"notes": [
{
"category": "summary",
"text": "A malicious server can serve excessive amounts of \"Set-Cookie:\" headers in a HTTP response to curl and curl \u003c 7.84.0 stores all of them. A sufficiently large amount of (big) cookies make subsequent HTTP requests to this, or other servers to which the cookies match, create requests that become larger than the threshold that curl uses internally to avoid sending crazy large requests (1048576 bytes) and instead returns an error.This denial state might remain for as long as the same cookies are kept, match and haven\u0027t expired. Due to cookie matching rules, a server on \"foo.example.com\" can set cookies that also would match for \"bar.example.com\", making it it possible for a \"sister server\" to effectively cause a denial of service for a sibling site on the same second level domain using this method.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Restrict physical access to the affected drives, also to their Ethernet Port included on the front of the control door",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "mitigation",
"details": "Disconnect any direct network connection to the integrated SCALANCE S615 device",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "vendor_fix",
"details": "Update the firmware of the integrated SCALANCE S615 device to V7.2 or later version",
"product_ids": [
"CSAFPID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
],
"title": "CVE-2022-32205"
},
{
"cve": "CVE-2022-32206",
"cwe": {
"id": "CWE-770",
"name": "Allocation of Resources Without Limits or Throttling"
},
"notes": [
{
"category": "summary",
"text": "curl \u003c 7.84.0 supports \"chained\" HTTP compression algorithms, meaning that a serverresponse can be compressed multiple times and potentially with different algorithms. The number of acceptable \"links\" in this \"decompression chain\" was unbounded, allowing a malicious server to insert a virtually unlimited number of compression steps.The use of such a decompression chain could result in a \"malloc bomb\", makingcurl end up spending enormous amounts of allocated heap memory, or trying toand returning out of memory errors.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Restrict physical access to the affected drives, also to their Ethernet Port included on the front of the control door",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "mitigation",
"details": "Disconnect any direct network connection to the integrated SCALANCE S615 device",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "vendor_fix",
"details": "Update the firmware of the integrated SCALANCE S615 device to V7.2 or later version",
"product_ids": [
"CSAFPID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
],
"title": "CVE-2022-32206"
},
{
"cve": "CVE-2022-32207",
"cwe": {
"id": "CWE-276",
"name": "Incorrect Default Permissions"
},
"notes": [
{
"category": "summary",
"text": "When curl \u003c 7.84.0 saves cookies, alt-svc and hsts data to local files, it makes the operation atomic by finalizing the operation with a rename from a temporary name to the final target file name.In that rename operation, it might accidentally *widen* the permissions for the target file, leaving the updated file accessible to more users than intended.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Restrict physical access to the affected drives, also to their Ethernet Port included on the front of the control door",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "mitigation",
"details": "Disconnect any direct network connection to the integrated SCALANCE S615 device",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "vendor_fix",
"details": "Update the firmware of the integrated SCALANCE S615 device to V7.2 or later version",
"product_ids": [
"CSAFPID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
],
"title": "CVE-2022-32207"
},
{
"cve": "CVE-2022-32208",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"notes": [
{
"category": "summary",
"text": "When curl \u003c 7.84.0 does FTP transfers secured by krb5, it handles message verification failures wrongly. This flaw makes it possible for a Man-In-The-Middle attack to go unnoticed and even allows it to inject data to the client.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Restrict physical access to the affected drives, also to their Ethernet Port included on the front of the control door",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "mitigation",
"details": "Disconnect any direct network connection to the integrated SCALANCE S615 device",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "vendor_fix",
"details": "Update the firmware of the integrated SCALANCE S615 device to V7.2 or later version",
"product_ids": [
"CSAFPID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
],
"title": "CVE-2022-32208"
},
{
"cve": "CVE-2022-35252",
"cwe": {
"id": "CWE-1286",
"name": "Improper Validation of Syntactic Correctness of Input"
},
"notes": [
{
"category": "summary",
"text": "When curl is used to retrieve and parse cookies from a HTTP(S) server, itaccepts cookies using control codes that when later are sent back to a HTTPserver might make the server return 400 responses. Effectively allowing a\"sister site\" to deny service to all siblings.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Restrict physical access to the affected drives, also to their Ethernet Port included on the front of the control door",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "mitigation",
"details": "Disconnect any direct network connection to the integrated SCALANCE S615 device",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "vendor_fix",
"details": "Update the firmware of the integrated SCALANCE S615 device to V7.2 or later version",
"product_ids": [
"CSAFPID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
],
"title": "CVE-2022-35252"
},
{
"cve": "CVE-2022-36946",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "summary",
"text": "nfqnl_mangle in net/netfilter/nfnetlink_queue.c in the Linux kernel through 5.18.14 allows remote attackers to cause a denial of service (panic) because, in the case of an nf_queue verdict with a one-byte nfta_payload attribute, an skb_pull can encounter a negative skb-\u003elen.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Restrict physical access to the affected drives, also to their Ethernet Port included on the front of the control door",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "mitigation",
"details": "Disconnect any direct network connection to the integrated SCALANCE S615 device",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "vendor_fix",
"details": "Update the firmware of the integrated SCALANCE S615 device to V7.2 or later version",
"product_ids": [
"CSAFPID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
],
"title": "CVE-2022-36946"
}
]
}
ICSA-23-166-10
Vulnerability from csaf_cisa - Published: 2023-06-13 00:00 - Updated: 2024-04-09 00:00Notes
{
"document": {
"acknowledgments": [
{
"organization": "Siemens ProductCERT",
"summary": "reporting these vulnerabilities to CISA."
}
],
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Disclosure is not limited",
"tlp": {
"label": "WHITE",
"url": "https://us-cert.cisa.gov/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Multiple vulnerabilities have been identified in the BIOS of the SIMATIC S7-1500 TM MFP before V1.3.0.\n\nSiemens has released a new version for SIMATIC S7-1500 TM MFP - BIOS and recommends to update to the latest version.",
"title": "Summary"
},
{
"category": "general",
"text": "As a general security measure, Siemens strongly recommends to protect network access to devices with appropriate mechanisms. In order to operate the devices in a protected IT environment, Siemens recommends to configure the environment according to Siemens\u0027 operational guidelines for Industrial Security (Download: \nhttps://www.siemens.com/cert/operational-guidelines-industrial-security), and to follow the recommendations in the product manuals.\nAdditional information on Industrial Security by Siemens can be found at: https://www.siemens.com/industrialsecurity",
"title": "General Recommendations"
},
{
"category": "general",
"text": "For further inquiries on security vulnerabilities in Siemens products and solutions, please contact the Siemens ProductCERT: https://www.siemens.com/cert/advisories",
"title": "Additional Resources"
},
{
"category": "legal_disclaimer",
"text": "Siemens Security Advisories are subject to the terms and conditions contained in Siemens\u0027 underlying license terms or other applicable agreements previously agreed to with Siemens (hereinafter \"License Terms\"). To the extent applicable to information, software or documentation made available in or through a Siemens Security Advisory, the Terms of Use of Siemens\u0027 Global Website (https://www.siemens.com/terms_of_use, hereinafter \"Terms of Use\"), in particular Sections 8-10 of the Terms of Use, shall apply additionally. In case of conflicts, the License Terms shall prevail over the Terms of Use.",
"title": "Terms of Use"
},
{
"category": "legal_disclaimer",
"text": "All information products included in https://us-cert.cisa.gov/ics are provided \"as is\" for informational purposes only. The Department of Homeland Security (DHS) does not provide any warranties of any kind regarding any information contained within. DHS does not endorse any commercial product or service, referenced in this product or otherwise. Further dissemination of this product is governed by the Traffic Light Protocol (TLP) marking in the header. For more information about TLP, see https://us-cert.cisa.gov/tlp/.",
"title": "Legal Notice"
},
{
"category": "other",
"text": "This CISA CSAF advisory was converted from Siemens ProductCERT\u0027s CSAF advisory.",
"title": "Advisory Conversion Disclaimer"
},
{
"category": "other",
"text": "Multiple",
"title": "Critical infrastructure sectors"
},
{
"category": "other",
"text": "Worldwide",
"title": "Countries/areas deployed"
},
{
"category": "other",
"text": "Germany",
"title": "Company headquarters location"
},
{
"category": "general",
"text": "CISA recommends users take defensive measures to minimize the exploitation risk of this vulnerability.",
"title": "Recommended Practices"
},
{
"category": "general",
"text": "Minimize network exposure for all control system devices and/or systems, and ensure they are not accessible from the internet.",
"title": "Recommended Practices"
},
{
"category": "general",
"text": "Locate control system networks and remote devices behind firewalls and isolate them from business networks.",
"title": "Recommended Practices"
},
{
"category": "general",
"text": "When remote access is required, use more secure methods, such as Virtual Private Networks (VPNs), recognizing VPNs may have vulnerabilities and should be updated to the most recent version available. Also recognize VPN is only as secure as its connected devices.",
"title": "Recommended Practices"
},
{
"category": "general",
"text": "CISA reminds organizations to perform proper impact analysis and risk assessment prior to deploying defensive measures.",
"title": "Recommended Practices"
},
{
"category": "general",
"text": "CISA also provides a section for control systems security recommended practices on the ICS webpage on cisa.gov. Several CISA products detailing cyber defense best practices are available for reading and download, including Improving Industrial Control Systems Cybersecurity with Defense-in-Depth Strategies.",
"title": "Recommended Practices"
},
{
"category": "general",
"text": "CISA encourages organizations to implement recommended cybersecurity strategies for proactive defense of ICS assets. Additional mitigation guidance and recommended practices are publicly available on the ICS webpage at cisa.gov in the technical information paper, ICS-TIP-12-146-01B--Targeted Cyber Intrusion Detection and Mitigation Strategies.",
"title": "Recommended Practices"
},
{
"category": "general",
"text": "Organizations observing suspected malicious activity should follow established internal procedures and report findings to CISA for tracking and correlation against other incidents.",
"title": "Recommended Practices"
}
],
"publisher": {
"category": "other",
"contact_details": "central@cisa.dhs.gov",
"name": "CISA",
"namespace": "https://www.cisa.gov/"
},
"references": [
{
"category": "self",
"summary": "SSA-831302: Vulnerabilities in the BIOS of the SIMATIC S7-1500 TM MFP before V1.3.0 - CSAF Version",
"url": "https://cert-portal.siemens.com/productcert/csaf/ssa-831302.json"
},
{
"category": "self",
"summary": "SSA-831302: Vulnerabilities in the BIOS of the SIMATIC S7-1500 TM MFP before V1.3.0 - HTML Version",
"url": "https://cert-portal.siemens.com/productcert/html/ssa-831302.html"
},
{
"category": "self",
"summary": "SSA-831302: Vulnerabilities in the BIOS of the SIMATIC S7-1500 TM MFP before V1.3.0 - PDF Version",
"url": "https://cert-portal.siemens.com/productcert/pdf/ssa-831302.pdf"
},
{
"category": "self",
"summary": "SSA-831302: Vulnerabilities in the BIOS of the SIMATIC S7-1500 TM MFP before V1.3.0 - TXT Version",
"url": "https://cert-portal.siemens.com/productcert/txt/ssa-831302.txt"
},
{
"category": "self",
"summary": "ICS Advisory ICSA-23-166-10 JSON",
"url": "https://raw.githubusercontent.com/cisagov/CSAF/develop/csaf_files/OT/white/2023/icsa-23-166-10.json"
},
{
"category": "self",
"summary": "ICS Advisory ICSA-23-166-10 - Web Version",
"url": "https://www.cisa.gov/news-events/ics-advisories/icsa-23-166-10"
},
{
"category": "external",
"summary": "Recommended Practices",
"url": "https://www.cisa.gov/uscert/ics/alerts/ICS-ALERT-10-301-01"
},
{
"category": "external",
"summary": "Recommended Practices",
"url": "https://www.cisa.gov/resources-tools/resources/ics-recommended-practices"
},
{
"category": "external",
"summary": "Recommended Practices",
"url": "https://www.cisa.gov/topics/industrial-control-systems"
},
{
"category": "external",
"summary": "Recommended Practices",
"url": "https://us-cert.cisa.gov/sites/default/files/recommended_practices/NCCIC_ICS-CERT_Defense_in_Depth_2016_S508C.pdf"
},
{
"category": "external",
"summary": "Recommended Practices",
"url": "https://www.cisa.gov/sites/default/files/publications/Cybersecurity_Best_Practices_for_Industrial_Control_Systems.pdf"
},
{
"category": "external",
"summary": "Recommended Practices",
"url": "https://www.cisa.gov/uscert/ics/tips/ICS-TIP-12-146-01B"
}
],
"title": "Siemens SIMATIC S7-1500 TM MFP BIOS",
"tracking": {
"current_release_date": "2024-04-09T00:00:00.000000Z",
"generator": {
"engine": {
"name": "CISA CSAF Generator",
"version": "1.0.0"
}
},
"id": "ICSA-23-166-10",
"initial_release_date": "2023-06-13T00:00:00.000000Z",
"revision_history": [
{
"date": "2023-06-13T00:00:00.000000Z",
"legacy_version": "1.0",
"number": "1",
"summary": "Publication Date"
},
{
"date": "2023-09-12T00:00:00.000000Z",
"legacy_version": "1.1",
"number": "2",
"summary": "Added CVE-2022-1015, CVE-2023-2898, CVE-2023-31248, CVE-2023-3390, CVE-2023-35001, CVE-2023-3610, CVE-2023-3611, CVE-2023-3776, CVE-2023-4004, CVE-2023-4015, CVE-2023-4128, CVE-2023-4147, CVE-2023-4273"
},
{
"date": "2023-11-14T00:00:00.000000Z",
"legacy_version": "1.2",
"number": "3",
"summary": "Added CVE-2023-4527, CVE-2023-4806, CVE-2023-4911, CVE-2023-5156"
},
{
"date": "2023-12-12T00:00:00.000000Z",
"legacy_version": "1.3",
"number": "4",
"summary": "Added CVE-2021-44879, CVE-2023-45863"
},
{
"date": "2024-04-09T00:00:00.000000Z",
"legacy_version": "1.4",
"number": "5",
"summary": "Added fix for SIMATIC S7-1500 TM MFP - BIOS"
}
],
"status": "final",
"version": "5"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version_range",
"name": "\u003cV1.3.0",
"product": {
"name": "SIMATIC S7-1500 TM MFP - BIOS",
"product_id": "CSAFPID-0001"
}
}
],
"category": "product_name",
"name": "SIMATIC S7-1500 TM MFP - BIOS"
}
],
"category": "vendor",
"name": "Siemens"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2016-10228",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "summary",
"text": "The iconv program in the GNU C Library (aka glibc or libc6) 2.31 and earlier, when invoked with multiple suffixes in the destination encoding (TRANSLATE or IGNORE) along with the -c option, enters an infinite loop when processing invalid multi-byte input sequences, leading to a denial of service.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V1.3.0 or later version",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109945851/"
},
{
"category": "workaround",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"CSAFPID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
],
"title": "CVE-2016-10228"
},
{
"cve": "CVE-2019-25013",
"cwe": {
"id": "CWE-125",
"name": "Out-of-bounds Read"
},
"notes": [
{
"category": "summary",
"text": "The iconv feature in the GNU C Library (aka glibc or libc6) through 2.32, when processing invalid multi-byte input sequences in the EUC-KR encoding, may have a buffer over-read.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V1.3.0 or later version",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109945851/"
},
{
"category": "workaround",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"CSAFPID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
],
"title": "CVE-2019-25013"
},
{
"cve": "CVE-2020-1752",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"notes": [
{
"category": "summary",
"text": "A use-after-free vulnerability introduced in glibc upstream version 2.14 was found in the way the tilde expansion was carried out. Directory paths containing an initial tilde followed by a valid username were affected by this issue. A local attacker could exploit this flaw by creating a specially crafted path that, when processed by the glob function, would potentially lead to arbitrary code execution. This was fixed in version 2.32.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V1.3.0 or later version",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109945851/"
},
{
"category": "workaround",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"CSAFPID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.0,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
],
"title": "CVE-2020-1752"
},
{
"cve": "CVE-2020-10029",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"notes": [
{
"category": "summary",
"text": "The GNU C Library (aka glibc or libc6) before 2.32 could overflow an on-stack buffer during range reduction if an input to an 80-bit long double function contains a non-canonical bit pattern, a seen when passing a 0x5d414141414141410000 value to sinl on x86 targets. This is related to sysdeps/ieee754/ldbl-96/e_rem_pio2l.c.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V1.3.0 or later version",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109945851/"
},
{
"category": "workaround",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"CSAFPID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
],
"title": "CVE-2020-10029"
},
{
"cve": "CVE-2020-27618",
"cwe": {
"id": "CWE-835",
"name": "Loop with Unreachable Exit Condition (\u0027Infinite Loop\u0027)"
},
"notes": [
{
"category": "summary",
"text": "The iconv function in the GNU C Library (aka glibc or libc6) 2.32 and earlier, when processing invalid multi-byte input sequences in IBM1364, IBM1371, IBM1388, IBM1390, and IBM1399 encodings, fails to advance the input state, which could lead to an infinite loop in applications, resulting in a denial of service, a different vulnerability from CVE-2016-10228.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V1.3.0 or later version",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109945851/"
},
{
"category": "workaround",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"CSAFPID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
],
"title": "CVE-2020-27618"
},
{
"cve": "CVE-2020-29562",
"cwe": {
"id": "CWE-617",
"name": "Reachable Assertion"
},
"notes": [
{
"category": "summary",
"text": "The iconv function in the GNU C Library (aka glibc or libc6) 2.30 to 2.32, when converting UCS4 text containing an irreversible character, fails an assertion in the code path and aborts the program, potentially resulting in a denial of service.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V1.3.0 or later version",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109945851/"
},
{
"category": "workaround",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"CSAFPID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.8,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
],
"title": "CVE-2020-29562"
},
{
"cve": "CVE-2021-3326",
"cwe": {
"id": "CWE-617",
"name": "Reachable Assertion"
},
"notes": [
{
"category": "summary",
"text": "The iconv function in the GNU C Library (aka glibc or libc6) 2.32 and earlier, when processing invalid input sequences in the ISO-2022-JP-3 encoding, fails an assertion in the code path and aborts the program, potentially resulting in a denial of service.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V1.3.0 or later version",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109945851/"
},
{
"category": "workaround",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"CSAFPID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
],
"title": "CVE-2021-3326"
},
{
"cve": "CVE-2021-3998",
"cwe": {
"id": "CWE-125",
"name": "Out-of-bounds Read"
},
"notes": [
{
"category": "summary",
"text": "A flaw was found in glibc. The realpath() function can mistakenly return an unexpected value, potentially leading to information leakage and disclosure of sensitive data.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V1.3.0 or later version",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109945851/"
},
{
"category": "workaround",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"CSAFPID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
],
"title": "CVE-2021-3998"
},
{
"cve": "CVE-2021-3999",
"cwe": {
"id": "CWE-193",
"name": "Off-by-one Error"
},
"notes": [
{
"category": "summary",
"text": "A flaw was found in glibc. An off-by-one buffer overflow and underflow in getcwd() may lead to memory corruption when the size of the buffer is exactly 1. A local attacker who can control the input buffer and size passed to getcwd() in a setuid program could use this flaw to potentially execute arbitrary code and escalate their privileges on the system.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V1.3.0 or later version",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109945851/"
},
{
"category": "workaround",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"CSAFPID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
],
"title": "CVE-2021-3999"
},
{
"cve": "CVE-2021-20269",
"cwe": {
"id": "CWE-276",
"name": "Incorrect Default Permissions"
},
"notes": [
{
"category": "summary",
"text": "A flaw was found in the permissions of a log file created by kexec-tools. This flaw allows a local unprivileged user to read this file and leak kernel internal information from a previous panic. The highest threat from this vulnerability is to confidentiality. This flaw affects kexec-tools shipped by Fedora versions prior to 2.0.21-8 and RHEL versions prior to 2.0.20-47.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V1.3.0 or later version",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109945851/"
},
{
"category": "workaround",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"CSAFPID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
],
"title": "CVE-2021-20269"
},
{
"cve": "CVE-2021-27645",
"cwe": {
"id": "CWE-415",
"name": "Double Free"
},
"notes": [
{
"category": "summary",
"text": "The nameserver caching daemon (nscd) in the GNU C Library (aka glibc or libc6) 2.29 through 2.33, when processing a request for netgroup lookup, may crash due to a double-free, potentially resulting in degraded service or Denial of Service on the local system. This is related to netgroupcache.c.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V1.3.0 or later version",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109945851/"
},
{
"category": "workaround",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"CSAFPID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 2.5,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
],
"title": "CVE-2021-27645"
},
{
"cve": "CVE-2021-28831",
"cwe": {
"id": "CWE-755",
"name": "Improper Handling of Exceptional Conditions"
},
"notes": [
{
"category": "summary",
"text": "decompress_gunzip.c in BusyBox through 1.32.1 mishandles the error bit on the huft_build result pointer, with a resultant invalid free or segmentation fault, via malformed gzip data.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V1.3.0 or later version",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109945851/"
},
{
"category": "workaround",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"CSAFPID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
],
"title": "CVE-2021-28831"
},
{
"cve": "CVE-2021-33574",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"notes": [
{
"category": "summary",
"text": "The mq_notify function in the GNU C Library (aka glibc) versions 2.32 and 2.33 has a use-after-free. It may use the notification thread attributes object (passed through its struct sigevent parameter) after it has been freed by the caller, leading to a denial of service (application crash) or possibly unspecified other impact.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V1.3.0 or later version",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109945851/"
},
{
"category": "workaround",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"CSAFPID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
],
"title": "CVE-2021-33574"
},
{
"cve": "CVE-2021-35942",
"cwe": {
"id": "CWE-190",
"name": "Integer Overflow or Wraparound"
},
"notes": [
{
"category": "summary",
"text": "The wordexp function in the GNU C Library (aka glibc) through 2.33 may crash or read arbitrary memory in parse_param (in posix/wordexp.c) when called with an untrusted, crafted pattern, potentially resulting in a denial of service or disclosure of information. This occurs because atoi was used but strtoul should have been used to ensure correct calculations.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V1.3.0 or later version",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109945851/"
},
{
"category": "workaround",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"CSAFPID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.1,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
],
"title": "CVE-2021-35942"
},
{
"cve": "CVE-2021-38604",
"cwe": {
"id": "CWE-476",
"name": "NULL Pointer Dereference"
},
"notes": [
{
"category": "summary",
"text": "In librt in the GNU C Library (aka glibc) through 2.34, sysdeps/unix/sysv/linux/mq_notify.c mishandles certain NOTIFY_REMOVED data, leading to a NULL pointer dereference. NOTE: this vulnerability was introduced as a side effect of the CVE-2021-33574 fix.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V1.3.0 or later version",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109945851/"
},
{
"category": "workaround",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"CSAFPID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
],
"title": "CVE-2021-38604"
},
{
"cve": "CVE-2021-42373",
"cwe": {
"id": "CWE-476",
"name": "NULL Pointer Dereference"
},
"notes": [
{
"category": "summary",
"text": "A NULL pointer dereference in Busybox\u0027s man applet leads to denial of service when a section name is supplied but no page argument is given.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V1.3.0 or later version",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109945851/"
},
{
"category": "workaround",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"CSAFPID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.1,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
],
"title": "CVE-2021-42373"
},
{
"cve": "CVE-2021-42374",
"cwe": {
"id": "CWE-125",
"name": "Out-of-bounds Read"
},
"notes": [
{
"category": "summary",
"text": "An out-of-bounds heap read in Busybox\u0027s unlzma applet leads to information leak and denial of service when crafted LZMA-compressed input is decompressed. This can be triggered by any applet/format that internally supports LZMA compression.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V1.3.0 or later version",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109945851/"
},
{
"category": "workaround",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"CSAFPID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
],
"title": "CVE-2021-42374"
},
{
"cve": "CVE-2021-42375",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "summary",
"text": "An incorrect handling of a special element in Busybox\u0027s ash applet leads to denial of service when processing a crafted shell command, due to the shell mistaking specific characters for reserved characters. This may be used for DoS under rare conditions of filtered command input.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V1.3.0 or later version",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109945851/"
},
{
"category": "workaround",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"CSAFPID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.1,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
],
"title": "CVE-2021-42375"
},
{
"cve": "CVE-2021-42376",
"cwe": {
"id": "CWE-476",
"name": "NULL Pointer Dereference"
},
"notes": [
{
"category": "summary",
"text": "A NULL pointer dereference in Busybox\u0027s hush applet leads to denial of service when processing a crafted shell command, due to missing validation after a \\x03 delimiter character. This may be used for DoS under very rare conditions of filtered command input.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V1.3.0 or later version",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109945851/"
},
{
"category": "workaround",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"CSAFPID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.1,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
],
"title": "CVE-2021-42376"
},
{
"cve": "CVE-2021-42377",
"cwe": {
"id": "CWE-763",
"name": "Release of Invalid Pointer or Reference"
},
"notes": [
{
"category": "summary",
"text": "An attacker-controlled pointer free in Busybox\u0027s hush applet leads to denial of service and possible code execution when processing a crafted shell command, due to the shell mishandling the \u0026\u0026\u0026 string. This may be used for remote code execution under rare conditions of filtered command input.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V1.3.0 or later version",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109945851/"
},
{
"category": "workaround",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"CSAFPID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
],
"title": "CVE-2021-42377"
},
{
"cve": "CVE-2021-42378",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"notes": [
{
"category": "summary",
"text": "A use-after-free in Busybox\u0027s awk applet leads to denial of service and possibly code execution when processing a crafted awk pattern in the getvar_i function.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V1.3.0 or later version",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109945851/"
},
{
"category": "workaround",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"CSAFPID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.6,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
],
"title": "CVE-2021-42378"
},
{
"cve": "CVE-2021-42379",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"notes": [
{
"category": "summary",
"text": "A use-after-free in Busybox\u0027s awk applet leads to denial of service and possibly code execution when processing a crafted awk pattern in the next_input_file function.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V1.3.0 or later version",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109945851/"
},
{
"category": "workaround",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"CSAFPID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.6,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
],
"title": "CVE-2021-42379"
},
{
"cve": "CVE-2021-42380",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"notes": [
{
"category": "summary",
"text": "A use-after-free in awk leads to denial of service and possibly code execution when processing a crafted awk pattern in the clrvar function.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V1.3.0 or later version",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109945851/"
},
{
"category": "workaround",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"CSAFPID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.6,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
],
"title": "CVE-2021-42380"
},
{
"cve": "CVE-2021-42381",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"notes": [
{
"category": "summary",
"text": "A use-after-free in awk leads to denial of service and possibly code execution when processing a crafted awk pattern in the hash_init function.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V1.3.0 or later version",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109945851/"
},
{
"category": "workaround",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"CSAFPID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.6,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
],
"title": "CVE-2021-42381"
},
{
"cve": "CVE-2021-42382",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"notes": [
{
"category": "summary",
"text": "A use-after-free in awk leads to denial of service and possibly code execution when processing a crafted awk pattern in the getvar_s function.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V1.3.0 or later version",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109945851/"
},
{
"category": "workaround",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"CSAFPID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.6,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
],
"title": "CVE-2021-42382"
},
{
"cve": "CVE-2021-42383",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"notes": [
{
"category": "summary",
"text": "A use-after-free in awk leads to denial of service and possibly code execution when processing a crafted awk pattern in the evaluate function.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V1.3.0 or later version",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109945851/"
},
{
"category": "workaround",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"CSAFPID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.6,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
],
"title": "CVE-2021-42383"
},
{
"cve": "CVE-2021-42384",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"notes": [
{
"category": "summary",
"text": "A use-after-free in Busybox\u0027s awk applet leads to denial of service and possibly code execution when processing a crafted awk pattern in the handle_special function.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V1.3.0 or later version",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109945851/"
},
{
"category": "workaround",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"CSAFPID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.6,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
],
"title": "CVE-2021-42384"
},
{
"cve": "CVE-2021-42385",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"notes": [
{
"category": "summary",
"text": "A use-after-free in awk leads to denial of service and possibly code execution when processing a crafted awk pattern in the evaluate function.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V1.3.0 or later version",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109945851/"
},
{
"category": "workaround",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"CSAFPID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.6,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
],
"title": "CVE-2021-42385"
},
{
"cve": "CVE-2021-42386",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"notes": [
{
"category": "summary",
"text": "A use-after-free in awk leads to denial of service and possibly code execution when processing a crafted awk pattern in the nvalloc function.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V1.3.0 or later version",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109945851/"
},
{
"category": "workaround",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"CSAFPID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.6,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
],
"title": "CVE-2021-42386"
},
{
"cve": "CVE-2021-44879",
"cwe": {
"id": "CWE-476",
"name": "NULL Pointer Dereference"
},
"notes": [
{
"category": "summary",
"text": "In gc_data_segment in fs/f2fs/gc.c in the Linux kernel before 5.16.3, special files are not considered, leading to a move_data_page NULL pointer dereference.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V1.3.0 or later version",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109945851/"
},
{
"category": "workaround",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"CSAFPID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
],
"title": "CVE-2021-44879"
},
{
"cve": "CVE-2022-1015",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"notes": [
{
"category": "summary",
"text": "A flaw was found in the Linux kernel in linux/net/netfilter/nf_tables_api.c of the netfilter subsystem. This flaw allows a local user to cause an out-of-bounds write issue.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V1.3.0 or later version",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109945851/"
},
{
"category": "workaround",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"CSAFPID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.6,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
],
"title": "CVE-2022-1015"
},
{
"cve": "CVE-2022-1882",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"notes": [
{
"category": "summary",
"text": "A use-after-free flaw was found in the Linux kernel\u2019s pipes functionality in how a user performs manipulations with the pipe post_one_notification() after free_pipe_info() that is already called. This flaw allows a local user to crash or potentially escalate their privileges on the system.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V1.3.0 or later version",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109945851/"
},
{
"category": "workaround",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"CSAFPID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
],
"title": "CVE-2022-1882"
},
{
"cve": "CVE-2022-2585",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"notes": [
{
"category": "summary",
"text": "A use-after-free flaw was found in the Linux kernel\u2019s POSIX CPU timers functionality in the way a user creates and then deletes the timer in the non-leader thread of the program. This flaw allows a local user to crash or potentially escalate their privileges on the system.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V1.3.0 or later version",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109945851/"
},
{
"category": "workaround",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"CSAFPID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
],
"title": "CVE-2022-2585"
},
{
"cve": "CVE-2022-2588",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "summary",
"text": "Zhenpeng Lin discovered that the network packet scheduler implementation in the Linux kernel did not properly remove all references to a route filter before freeing it in some situations. A local attacker could use this to cause a denial of service (system crash) or execute arbitrary code.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V1.3.0 or later version",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109945851/"
},
{
"category": "workaround",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"CSAFPID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
],
"title": "CVE-2022-2588"
},
{
"cve": "CVE-2022-2905",
"cwe": {
"id": "CWE-125",
"name": "Out-of-bounds Read"
},
"notes": [
{
"category": "summary",
"text": "An out-of-bounds memory read flaw was found in the Linux kernel\u0027s BPF subsystem in how a user calls the bpf_tail_call function with a key larger than the max_entries of the map. This flaw allows a local user to gain unauthorized access to data.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V1.3.0 or later version",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109945851/"
},
{
"category": "workaround",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"CSAFPID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
],
"title": "CVE-2022-2905"
},
{
"cve": "CVE-2022-3028",
"cwe": {
"id": "CWE-362",
"name": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)"
},
"notes": [
{
"category": "summary",
"text": "A race condition was found in the Linux kernel\u0027s IP framework for transforming packets (XFRM subsystem) when multiple calls to xfrm_probe_algs occurred simultaneously. This flaw could allow a local attacker to potentially trigger an out-of-bounds write or leak kernel heap memory by performing an out-of-bounds read and copying it into a socket.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V1.3.0 or later version",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109945851/"
},
{
"category": "workaround",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"CSAFPID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.0,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
],
"title": "CVE-2022-3028"
},
{
"cve": "CVE-2022-3435",
"cwe": {
"id": "CWE-119",
"name": "Improper Restriction of Operations within the Bounds of a Memory Buffer"
},
"notes": [
{
"category": "summary",
"text": "A vulnerability classified as problematic has been found in Linux Kernel. This affects the function fib_nh_match of the file net/ipv4/fib_semantics.c of the component IPv4 Handler. The manipulation leads to out-of-bounds read. It is possible to initiate the attack remotely. It is recommended to apply a patch to fix this issue. The identifier VDB-210357 was assigned to this vulnerability.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V1.3.0 or later version",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109945851/"
},
{
"category": "workaround",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"CSAFPID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
],
"title": "CVE-2022-3435"
},
{
"cve": "CVE-2022-3586",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"notes": [
{
"category": "summary",
"text": "A flaw was found in the Linux kernel\u2019s networking code. A use-after-free was found in the way the sch_sfb enqueue function used the socket buffer (SKB) cb field after the same SKB had been enqueued (and freed) into a child qdisc. This flaw allows a local, unprivileged user to crash the system, causing a denial of service.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V1.3.0 or later version",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109945851/"
},
{
"category": "workaround",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"CSAFPID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
],
"title": "CVE-2022-3586"
},
{
"cve": "CVE-2022-4378",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"notes": [
{
"category": "summary",
"text": "A stack overflow flaw was found in the Linux kernel\u0027s SYSCTL subsystem in how a user changes certain kernel parameters and variables. This flaw allows a local user to crash or potentially escalate their privileges on the system.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V1.3.0 or later version",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109945851/"
},
{
"category": "workaround",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"CSAFPID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
],
"title": "CVE-2022-4378"
},
{
"cve": "CVE-2022-4662",
"cwe": {
"id": "CWE-455",
"name": "Non-exit on Failed Initialization"
},
"notes": [
{
"category": "summary",
"text": "A flaw incorrect access control in the Linux kernel USB core subsystem was found in the way user attaches usb device. A local user could use this flaw to crash the system.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V1.3.0 or later version",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109945851/"
},
{
"category": "workaround",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"CSAFPID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
],
"title": "CVE-2022-4662"
},
{
"cve": "CVE-2022-20421",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"notes": [
{
"category": "summary",
"text": "In binder_inc_ref_for_node of binder.c, there is a possible way to corrupt memory due to a use after free. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-239630375References: Upstream kernel",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V1.3.0 or later version",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109945851/"
},
{
"category": "workaround",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"CSAFPID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
],
"title": "CVE-2022-20421"
},
{
"cve": "CVE-2022-20422",
"cwe": {
"id": "CWE-362",
"name": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)"
},
"notes": [
{
"category": "summary",
"text": "In emulation_proc_handler of armv8_deprecated.c, there is a possible way to corrupt memory due to a race condition. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-237540956References: Upstream kernel",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V1.3.0 or later version",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109945851/"
},
{
"category": "workaround",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"CSAFPID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.0,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
],
"title": "CVE-2022-20422"
},
{
"cve": "CVE-2022-21233",
"cwe": {
"id": "CWE-311",
"name": "Missing Encryption of Sensitive Data"
},
"notes": [
{
"category": "summary",
"text": "Improper isolation of shared resources in some Intel(R) Processors may allow a privileged user to potentially enable information disclosure via local access.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V1.3.0 or later version",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109945851/"
},
{
"category": "workaround",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"CSAFPID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
],
"title": "CVE-2022-21233"
},
{
"cve": "CVE-2022-23218",
"cwe": {
"id": "CWE-120",
"name": "Buffer Copy without Checking Size of Input (\u0027Classic Buffer Overflow\u0027)"
},
"notes": [
{
"category": "summary",
"text": "The deprecated compatibility function svcunix_create in the sunrpc module of the GNU C Library (aka glibc) through 2.34 copies its path argument on the stack without validating its length, which may result in a buffer overflow, potentially resulting in a denial of service or (if an application is not built with a stack protector enabled) arbitrary code execution.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V1.3.0 or later version",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109945851/"
},
{
"category": "workaround",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"CSAFPID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
],
"title": "CVE-2022-23218"
},
{
"cve": "CVE-2022-23219",
"cwe": {
"id": "CWE-120",
"name": "Buffer Copy without Checking Size of Input (\u0027Classic Buffer Overflow\u0027)"
},
"notes": [
{
"category": "summary",
"text": "The deprecated compatibility function clnt_create in the sunrpc module of the GNU C Library (aka glibc) through 2.34 copies its hostname argument on the stack without validating its length, which may result in a buffer overflow, potentially resulting in a denial of service or (if an application is not built with a stack protector enabled) arbitrary code execution.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V1.3.0 or later version",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109945851/"
},
{
"category": "workaround",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"CSAFPID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
],
"title": "CVE-2022-23219"
},
{
"cve": "CVE-2022-28391",
"cwe": {
"id": "CWE-311",
"name": "Missing Encryption of Sensitive Data"
},
"notes": [
{
"category": "summary",
"text": "BusyBox through 1.35.0 allows remote attackers to execute arbitrary code if netstat is used to print a DNS PTR record\u0027s value to a VT compatible terminal. Alternatively, the attacker could choose to change the terminal\u0027s colors.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V1.3.0 or later version",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109945851/"
},
{
"category": "workaround",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"CSAFPID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
],
"title": "CVE-2022-28391"
},
{
"cve": "CVE-2022-30065",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"notes": [
{
"category": "summary",
"text": "A use-after-free in Busybox 1.35-x\u0027s awk applet leads to denial of service and possibly code execution when processing a crafted awk pattern in the copyvar function.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V1.3.0 or later version",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109945851/"
},
{
"category": "workaround",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"CSAFPID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
],
"title": "CVE-2022-30065"
},
{
"cve": "CVE-2022-39188",
"cwe": {
"id": "CWE-362",
"name": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)"
},
"notes": [
{
"category": "summary",
"text": "An issue was discovered in include/asm-generic/tlb.h in the Linux kernel before 5.19. Because of a race condition (unmap_mapping_range versus munmap), a device driver can free a page while it still has stale TLB entries. This only occurs in situations with VM_PFNMAP VMAs.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V1.3.0 or later version",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109945851/"
},
{
"category": "workaround",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"CSAFPID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
],
"title": "CVE-2022-39188"
},
{
"cve": "CVE-2022-39190",
"cwe": {
"id": "CWE-400",
"name": "Uncontrolled Resource Consumption"
},
"notes": [
{
"category": "summary",
"text": "An issue was discovered in net/netfilter/nf_tables_api.c in the Linux kernel before 5.19.6. A denial of service can occur upon binding to an already bound chain.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V1.3.0 or later version",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109945851/"
},
{
"category": "workaround",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"CSAFPID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
],
"title": "CVE-2022-39190"
},
{
"cve": "CVE-2022-40307",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"notes": [
{
"category": "summary",
"text": "An issue was discovered in the Linux kernel through 5.19.8. drivers/firmware/efi/capsule-loader.c has a race condition with a resultant use-after-free.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V1.3.0 or later version",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109945851/"
},
{
"category": "workaround",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"CSAFPID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
],
"title": "CVE-2022-40307"
},
{
"cve": "CVE-2022-41222",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"notes": [
{
"category": "summary",
"text": "mm/mremap.c in the Linux kernel before 5.13.3 has a use-after-free via a stale TLB because an rmap lock is not held during a PUD move.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V1.3.0 or later version",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109945851/"
},
{
"category": "workaround",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"CSAFPID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.0,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
],
"title": "CVE-2022-41222"
},
{
"cve": "CVE-2022-42703",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"notes": [
{
"category": "summary",
"text": "mm/rmap.c in the Linux kernel before 5.19.7 has a use-after-free related to leaf anon_vma double reuse.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V1.3.0 or later version",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109945851/"
},
{
"category": "workaround",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"CSAFPID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
],
"title": "CVE-2022-42703"
},
{
"cve": "CVE-2023-0179",
"cwe": {
"id": "CWE-190",
"name": "Integer Overflow or Wraparound"
},
"notes": [
{
"category": "summary",
"text": "A buffer overflow vulnerability was found in the Netfilter subsystem in the Linux Kernel. This issue could allow the leakage of both stack and heap addresses, and potentially allow Local Privilege Escalation to the root user via arbitrary code execution.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V1.3.0 or later version",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109945851/"
},
{
"category": "workaround",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"CSAFPID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
],
"title": "CVE-2023-0179"
},
{
"cve": "CVE-2023-0394",
"cwe": {
"id": "CWE-311",
"name": "Missing Encryption of Sensitive Data"
},
"notes": [
{
"category": "summary",
"text": "A NULL pointer dereference flaw was found in rawv6_push_pending_frames in net/ipv6/raw.c in the network subcomponent in the Linux kernel. This flaw causes the system to crash.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V1.3.0 or later version",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109945851/"
},
{
"category": "workaround",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"CSAFPID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
],
"title": "CVE-2023-0394"
},
{
"cve": "CVE-2023-1073",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"notes": [
{
"category": "summary",
"text": "A memory corruption flaw was found in the Linux kernel\u2019s human interface device (HID) subsystem in how a user inserts a malicious USB device. This flaw allows a local user to crash or potentially escalate their privileges on the system.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V1.3.0 or later version",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109945851/"
},
{
"category": "workaround",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"CSAFPID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.6,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
],
"title": "CVE-2023-1073"
},
{
"cve": "CVE-2023-2898",
"cwe": {
"id": "CWE-476",
"name": "NULL Pointer Dereference"
},
"notes": [
{
"category": "summary",
"text": "There is a null-pointer-dereference flaw found in f2fs_write_end_io in fs/f2fs/data.c in the Linux kernel. This flaw allows a local privileged user to cause a denial of service problem.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V1.3.0 or later version",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109945851/"
},
{
"category": "workaround",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"CSAFPID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
],
"title": "CVE-2023-2898"
},
{
"cve": "CVE-2023-3390",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"notes": [
{
"category": "summary",
"text": "A use-after-free vulnerability was found in the Linux kernel\u0027s netfilter subsystem in net/netfilter/nf_tables_api.c.\n\nMishandled error handling with NFT_MSG_NEWRULE makes it possible to use a dangling pointer in the same transaction causing a use-after-free vulnerability. This flaw allows a local attacker with user access to cause a privilege escalation issue.\n\nWe recommend upgrading past commit\u00a01240eb93f0616b21c675416516ff3d74798fdc97.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V1.3.0 or later version",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109945851/"
},
{
"category": "workaround",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"CSAFPID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
],
"title": "CVE-2023-3390"
},
{
"cve": "CVE-2023-3610",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"notes": [
{
"category": "summary",
"text": "A use-after-free vulnerability in the Linux kernel\u0027s netfilter: nf_tables component can be exploited to achieve local privilege escalation.\r\n\r\nFlaw in the error handling of bound chains causes a use-after-free in the abort path of NFT_MSG_NEWRULE. The vulnerability requires CAP_NET_ADMIN to be triggered.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V1.3.0 or later version",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109945851/"
},
{
"category": "workaround",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"CSAFPID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
],
"title": "CVE-2023-3610"
},
{
"cve": "CVE-2023-3611",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"notes": [
{
"category": "summary",
"text": "An out-of-bounds write vulnerability in the Linux kernel\u0027s net/sched: sch_qfq component can be exploited to achieve local privilege escalation.\r\n\r\nThe qfq_change_agg() function in net/sched/sch_qfq.c allows an out-of-bounds write because lmax is updated according to packet sizes without bounds checks.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V1.3.0 or later version",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109945851/"
},
{
"category": "workaround",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"CSAFPID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
],
"title": "CVE-2023-3611"
},
{
"cve": "CVE-2023-3776",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"notes": [
{
"category": "summary",
"text": "A use-after-free vulnerability in the Linux kernel\u0027s net/sched: cls_fw component can be exploited to achieve local privilege escalation.\r\n\r\nIf tcf_change_indev() fails, fw_set_parms() will immediately return an error after incrementing or decrementing the reference counter in tcf_bind_filter(). If an attacker can control the reference counter and set it to zero, they can cause the reference to be freed, leading to a use-after-free vulnerability.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V1.3.0 or later version",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109945851/"
},
{
"category": "workaround",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"CSAFPID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
],
"title": "CVE-2023-3776"
},
{
"cve": "CVE-2023-4004",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "summary",
"text": "A use-after-free flaw was found in the Linux kernel\u0027s netfilter in the way a user triggers the nft_pipapo_remove function with the element, without a NFT_SET_EXT_KEY_END. This issue could allow a local user to crash the system or potentially escalate their privileges on the system.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V1.3.0 or later version",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109945851/"
},
{
"category": "workaround",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"CSAFPID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
],
"title": "CVE-2023-4004"
},
{
"cve": "CVE-2023-4015",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "summary",
"text": "The netfilter subsystem in the Linux kernel did not properly handle bound chain deactivation in certain circumstances. A local attacker could possibly use this to cause a denial of service (system crash) or execute arbitrary code.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V1.3.0 or later version",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109945851/"
},
{
"category": "workaround",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"CSAFPID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.4,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
],
"title": "CVE-2023-4015"
},
{
"cve": "CVE-2023-4128",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"notes": [
{
"category": "summary",
"text": "A use-after-free vulnerability in net/sched/cls_fw.c in classifiers (cls_fw, cls_u32, and cls_route) in the Linux Kernel allows a local attacker to perform a local privilege escalation due to incorrect handling of the existing filter, leading to a kernel information leak.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V1.3.0 or later version",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109945851/"
},
{
"category": "workaround",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"CSAFPID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
],
"title": "CVE-2023-4128"
},
{
"cve": "CVE-2023-4147",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"notes": [
{
"category": "summary",
"text": "A use-after-free vulnerability in the Linux kernel\u2019s Netfilter functionality when adding a rule with NFTA_RULE_CHAIN_ID allows a local user to crash or escalate their privileges on the system.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V1.3.0 or later version",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109945851/"
},
{
"category": "workaround",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"CSAFPID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
],
"title": "CVE-2023-4147"
},
{
"cve": "CVE-2023-4273",
"cwe": {
"id": "CWE-121",
"name": "Stack-based Buffer Overflow"
},
"notes": [
{
"category": "summary",
"text": "This vulnerability exists in the implementation of the file name reconstruction function, which is responsible for reading file name entries from a directory index and merging file name parts belonging to one file into a single long file name. Since the file name characters are copied into a stack variable, a local privileged attacker could use this vulnerability to overflow the kernel stack.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V1.3.0 or later version",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109945851/"
},
{
"category": "workaround",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"CSAFPID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.0,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N/E:U/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
],
"title": "CVE-2023-4273"
},
{
"cve": "CVE-2023-4527",
"cwe": {
"id": "CWE-125",
"name": "Out-of-bounds Read"
},
"notes": [
{
"category": "summary",
"text": "A flaw was found in glibc. When the getaddrinfo function is called with the AF_UNSPEC address family and the system is configured with no-aaaa mode via /etc/resolv.conf, a DNS response via TCP larger than 2048 bytes can potentially disclose stack contents through the function returned address data, and may cause a crash.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V1.3.0 or later version",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109945851/"
},
{
"category": "workaround",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"CSAFPID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
],
"title": "CVE-2023-4527"
},
{
"cve": "CVE-2023-4806",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"notes": [
{
"category": "summary",
"text": "A flaw was found in glibc. In an extremely rare situation, the getaddrinfo function may access memory that has been freed, resulting in an application crash. This issue is only exploitable when a NSS module implements only the _nss_*_gethostbyname2_r and _nss_*_getcanonname_r hooks without implementing the _nss_*_gethostbyname3_r hook. The resolved name should return a large number of IPv6 and IPv4, and the call to the getaddrinfo function should have the AF_INET6 address family with AI_CANONNAME, AI_ALL and AI_V4MAPPED as flags.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V1.3.0 or later version",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109945851/"
},
{
"category": "workaround",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"CSAFPID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
],
"title": "CVE-2023-4806"
},
{
"cve": "CVE-2023-4911",
"cwe": {
"id": "CWE-121",
"name": "Stack-based Buffer Overflow"
},
"notes": [
{
"category": "summary",
"text": "A buffer overflow was discovered in the GNU C Library\u0027s dynamic loader ld.so while processing the GLIBC_TUNABLES environment variable. This issue could allow a local attacker to use maliciously crafted GLIBC_TUNABLES environment variables when launching binaries with SUID permission to execute code with elevated privileges.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V1.3.0 or later version",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109945851/"
},
{
"category": "workaround",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"CSAFPID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
],
"title": "CVE-2023-4911"
},
{
"cve": "CVE-2023-5156",
"cwe": {
"id": "CWE-401",
"name": "Missing Release of Memory after Effective Lifetime"
},
"notes": [
{
"category": "summary",
"text": "A flaw was found in the GNU C Library. A recent fix for CVE-2023-4806 introduced the potential for a memory leak, which may result in an application crash.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V1.3.0 or later version",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109945851/"
},
{
"category": "workaround",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"CSAFPID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
],
"title": "CVE-2023-5156"
},
{
"cve": "CVE-2023-31248",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"notes": [
{
"category": "summary",
"text": "Linux Kernel nftables Use-After-Free Local Privilege Escalation Vulnerability; `nft_chain_lookup_byid()` failed to check whether a chain was active and CAP_NET_ADMIN is in any user or network namespace",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V1.3.0 or later version",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109945851/"
},
{
"category": "workaround",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"CSAFPID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
],
"title": "CVE-2023-31248"
},
{
"cve": "CVE-2023-35001",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"notes": [
{
"category": "summary",
"text": "Linux Kernel nftables Out-Of-Bounds Read/Write Vulnerability; nft_byteorder poorly handled vm register contents when CAP_NET_ADMIN is in any user or network namespace",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V1.3.0 or later version",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109945851/"
},
{
"category": "workaround",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"CSAFPID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
],
"title": "CVE-2023-35001"
},
{
"cve": "CVE-2023-45863",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"notes": [
{
"category": "summary",
"text": "An issue was discovered in lib/kobject.c in the Linux kernel before 6.2.3. With root access, an attacker can trigger a race condition that results in a fill_kobj_path out-of-bounds write.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V1.3.0 or later version",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109945851/"
},
{
"category": "workaround",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"CSAFPID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
],
"title": "CVE-2023-45863"
}
]
}
MSRC_CVE-2021-42384
Vulnerability from csaf_microsoft - Published: 2021-11-02 00:00 - Updated: 2021-12-16 00:00Notes
{
"document": {
"category": "csaf_vex",
"csaf_version": "2.0",
"distribution": {
"text": "Public",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en-US",
"notes": [
{
"category": "general",
"text": "To determine the support lifecycle for your software, see the Microsoft Support Lifecycle: https://support.microsoft.com/lifecycle",
"title": "Additional Resources"
},
{
"category": "legal_disclaimer",
"text": "The information provided in the Microsoft Knowledge Base is provided \\\"as is\\\" without warranty of any kind. Microsoft disclaims all warranties, either express or implied, including the warranties of merchantability and fitness for a particular purpose. In no event shall Microsoft Corporation or its suppliers be liable for any damages whatsoever including direct, indirect, incidental, consequential, loss of business profits or special damages, even if Microsoft Corporation or its suppliers have been advised of the possibility of such damages. Some states do not allow the exclusion or limitation of liability for consequential or incidental damages so the foregoing limitation may not apply.",
"title": "Disclaimer"
}
],
"publisher": {
"category": "vendor",
"contact_details": "secure@microsoft.com",
"name": "Microsoft Security Response Center",
"namespace": "https://msrc.microsoft.com"
},
"references": [
{
"category": "self",
"summary": "CVE-2021-42384 A use-after-free in Busybox\u0027s awk applet leads to denial of service and possibly code execution when processing a crafted awk pattern in the handle_special function - VEX",
"url": "https://msrc.microsoft.com/csaf/vex/2021/msrc_cve-2021-42384.json"
},
{
"category": "external",
"summary": "Microsoft Support Lifecycle",
"url": "https://support.microsoft.com/lifecycle"
},
{
"category": "external",
"summary": "Common Vulnerability Scoring System",
"url": "https://www.first.org/cvss"
}
],
"title": "A use-after-free in Busybox\u0027s awk applet leads to denial of service and possibly code execution when processing a crafted awk pattern in the handle_special function",
"tracking": {
"current_release_date": "2021-12-16T00:00:00.000Z",
"generator": {
"date": "2025-10-19T22:19:06.417Z",
"engine": {
"name": "MSRC Generator",
"version": "1.0"
}
},
"id": "msrc_CVE-2021-42384",
"initial_release_date": "2021-11-02T00:00:00.000Z",
"revision_history": [
{
"date": "2021-11-18T00:00:00.000Z",
"legacy_version": "1",
"number": "1",
"summary": "Information published."
},
{
"date": "2021-12-16T00:00:00.000Z",
"legacy_version": "1.1",
"number": "2",
"summary": "Added busybox to CBL-Mariner 2.0"
}
],
"status": "final",
"version": "2"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "1.0",
"product": {
"name": "CBL Mariner 1.0",
"product_id": "16820"
}
},
{
"category": "product_version",
"name": "2.0",
"product": {
"name": "CBL Mariner 2.0",
"product_id": "17086"
}
}
],
"category": "product_name",
"name": "Azure Linux"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003ccm1 busybox 1.34.1-1",
"product": {
"name": "\u003ccm1 busybox 1.34.1-1",
"product_id": "2"
}
},
{
"category": "product_version",
"name": "cm1 busybox 1.34.1-1",
"product": {
"name": "cm1 busybox 1.34.1-1",
"product_id": "18965"
}
},
{
"category": "product_version_range",
"name": "\u003ccbl2 busybox 1.35.0-1",
"product": {
"name": "\u003ccbl2 busybox 1.35.0-1",
"product_id": "1"
}
},
{
"category": "product_version",
"name": "cbl2 busybox 1.35.0-1",
"product": {
"name": "cbl2 busybox 1.35.0-1",
"product_id": "18966"
}
}
],
"category": "product_name",
"name": "busybox"
}
],
"category": "vendor",
"name": "Microsoft"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "\u003ccm1 busybox 1.34.1-1 as a component of CBL Mariner 1.0",
"product_id": "16820-2"
},
"product_reference": "2",
"relates_to_product_reference": "16820"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cm1 busybox 1.34.1-1 as a component of CBL Mariner 1.0",
"product_id": "18965-16820"
},
"product_reference": "18965",
"relates_to_product_reference": "16820"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "\u003ccbl2 busybox 1.35.0-1 as a component of CBL Mariner 2.0",
"product_id": "17086-1"
},
"product_reference": "1",
"relates_to_product_reference": "17086"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cbl2 busybox 1.35.0-1 as a component of CBL Mariner 2.0",
"product_id": "18966-17086"
},
"product_reference": "18966",
"relates_to_product_reference": "17086"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2021-42384",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"notes": [
{
"category": "general",
"text": "JFROG",
"title": "Assigning CNA"
}
],
"product_status": {
"fixed": [
"18965-16820",
"18966-17086"
],
"known_affected": [
"16820-2",
"17086-1"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2021-42384 A use-after-free in Busybox\u0027s awk applet leads to denial of service and possibly code execution when processing a crafted awk pattern in the handle_special function - VEX",
"url": "https://msrc.microsoft.com/csaf/vex/2021/msrc_cve-2021-42384.json"
}
],
"remediations": [
{
"category": "vendor_fix",
"date": "2021-11-18T00:00:00.000Z",
"details": "1.34.1-1:Security Update:https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade",
"product_ids": [
"16820-2"
],
"url": "https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade"
},
{
"category": "vendor_fix",
"date": "2021-11-18T00:00:00.000Z",
"details": "1.35.0-1:Security Update:https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade",
"product_ids": [
"17086-1"
],
"url": "https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.2,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"environmentalsScore": 0.0,
"integrityImpact": "HIGH",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"temporalScore": 7.2,
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"16820-2",
"17086-1"
]
}
],
"title": "A use-after-free in Busybox\u0027s awk applet leads to denial of service and possibly code execution when processing a crafted awk pattern in the handle_special function"
}
]
}
GHSA-8CJP-PFR2-HJWJ
Vulnerability from github – Published: 2022-05-24 19:20 – Updated: 2025-11-03 21:30A use-after-free in Busybox's awk applet leads to denial of service and possibly code execution when processing a crafted awk pattern in the handle_special function
{
"affected": [],
"aliases": [
"CVE-2021-42384"
],
"database_specific": {
"cwe_ids": [
"CWE-416"
],
"github_reviewed": false,
"github_reviewed_at": null,
"nvd_published_at": "2021-11-15T21:15:00Z",
"severity": "HIGH"
},
"details": "A use-after-free in Busybox\u0027s awk applet leads to denial of service and possibly code execution when processing a crafted awk pattern in the handle_special function",
"id": "GHSA-8cjp-pfr2-hjwj",
"modified": "2025-11-03T21:30:35Z",
"published": "2022-05-24T19:20:50Z",
"references": [
{
"type": "ADVISORY",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-42384"
},
{
"type": "WEB",
"url": "https://claroty.com/team82/research/unboxing-busybox-14-vulnerabilities-uncovered-by-claroty-jfrog"
},
{
"type": "WEB",
"url": "https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog"
},
{
"type": "WEB",
"url": "https://lists.debian.org/debian-lts-announce/2025/01/msg00012.html"
},
{
"type": "WEB",
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV"
},
{
"type": "WEB",
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS"
},
{
"type": "WEB",
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV"
},
{
"type": "WEB",
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS"
},
{
"type": "WEB",
"url": "https://security.netapp.com/advisory/ntap-20211223-0002"
}
],
"schema_version": "1.4.0",
"severity": [
{
"score": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
"type": "CVSS_V3"
}
]
}
CVE-2021-42384
Vulnerability from csaf_phoenixcontactgmbhcokg - Published: 2022-04-12 06:00 - Updated: 2025-05-22 13:03Notes
{
"document": {
"acknowledgments": [
{
"organization": "CERT@VDE",
"summary": "coordination"
}
],
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en-GB",
"notes": [
{
"category": "summary",
"text": "PLCnext Control AXC F x152 is certified according to IEC 62443-4-1 and IEC 62443-4-2.\nThis certification requires that all third-party components used in the firmware are regularly checked for known vulnerabilities.\n\nFirmware components in version 2021.06 had already been updated. For the 2022.0 LTS version more firmware components have been updated implicitly fixing the vulnerabilities listed. The vulnerabilities listed above have not been individually verified in terms of actual impact and/or limitations in combination with the affected products listed. The current LTS release 2022.0 LTS contains updates of integrated third-party libraries, SDKs and other third-party software to address these issues nevertheless.\n\nUPDATE A (April 4th, 2022): Added RFC 4072 (Art. No. 1051328) and fixed affected version of AXC F 3152 ",
"title": "Summary"
},
{
"category": "description",
"text": "Availability, integrity, or confidentiality of the AXC F x152 might be compromised by attacks using these vulnerabilities. Please consult the CVE-IDs for vulnerability details.",
"title": "Impact"
},
{
"category": "description",
"text": "Phoenix Contact recommends operating network-capable devices in closed networks or protected with a suitable firewall. For detailed information on our recommendations for measures to protect network-capable devices, please refer to our application note: Measures to protect network-capable devices with Ethernet connection",
"title": "Mitigation"
},
{
"category": "description",
"text": "**Update to Firmware Release 2022.0.3 LTS or higher:**\n\n- AXC F 2152 (2404267) [Download](http://www.phoenixcontact.net/qr/2404267/firmware) \n- AXC F 1152 (1151412) [Download](http://www.phoenixcontact.net/qr/1151412/firmware) \n- AXC F 3152 (1069208) Not yet released\n\n**Update to PLCnext Engineer Release 2022.0.1 LTS or higher.**",
"title": "Remediation"
}
],
"publisher": {
"category": "vendor",
"contact_details": "psirt@phoenixcontact.com",
"name": "Phoenix Contact GmbH \u0026 Co. KG",
"namespace": "https://phoenixcontact.com/psirt"
},
"references": [
{
"category": "external",
"summary": "PHOENIX CONTACT PSIRT ",
"url": "https://phoenixcontact.com/psirt"
},
{
"category": "external",
"summary": "CERT@VDE Security Advisories for PHOENIX CONTACT",
"url": "https://certvde.com/en/advisories/vendor/phoenixcontact/"
},
{
"category": "self",
"summary": "VDE-2022-010: PHOENIX CONTACT: Multiple Linux component vulnerabilities fixed in latest AXC F x152 LTS release - HTML",
"url": "https://certvde.com/en/advisories/VDE-2022-010/"
},
{
"category": "self",
"summary": "VDE-2022-010: PHOENIX CONTACT: Multiple Linux component vulnerabilities fixed in latest AXC F x152 LTS release - CSAF",
"url": "https://phoenixcontact.csaf-tp.certvde.com/.well-known/csaf/white/2022/vde-2022-010.json"
}
],
"title": "PHOENIX CONTACT: Multiple Linux component vulnerabilities fixed in latest AXC F x152 LTS release",
"tracking": {
"aliases": [
"VDE-2022-010"
],
"current_release_date": "2025-05-22T13:03:10.000Z",
"generator": {
"date": "2025-04-01T06:28:07.225Z",
"engine": {
"name": "Secvisogram",
"version": "2.5.22"
}
},
"id": "VDE-2022-010",
"initial_release_date": "2022-04-12T06:00:00.000Z",
"revision_history": [
{
"date": "2022-04-12T06:00:00.000Z",
"number": "1",
"summary": "Initial revision."
},
{
"date": "2022-04-28T13:30:00.000Z",
"number": "2",
"summary": "Update A"
},
{
"date": "2025-05-22T13:03:10.000Z",
"number": "3",
"summary": "Fix: added distribution, quotation mark"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "AXC F 1152",
"product": {
"name": "AXC F 1152",
"product_id": "CSAFPID-11001",
"product_identification_helper": {
"model_numbers": [
"1151412"
]
}
}
},
{
"category": "product_name",
"name": "AXC F 2152",
"product": {
"name": "AXC F 2152",
"product_id": "CSAFPID-11002",
"product_identification_helper": {
"model_numbers": [
"2404267"
]
}
}
},
{
"category": "product_name",
"name": "AXC F 3152",
"product": {
"name": "AXC F 3152",
"product_id": "CSAFPID-11003",
"product_identification_helper": {
"model_numbers": [
"1069208"
]
}
}
},
{
"category": "product_name",
"name": "RFC 4072",
"product": {
"name": "RFC 4072",
"product_id": "CSAFPID-11004",
"product_identification_helper": {
"model_numbers": [
"1051328"
]
}
}
}
],
"category": "product_family",
"name": "Hardware"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c2022.0.3 LTS",
"product": {
"name": "Firmware \u003c2022.0.3 LTS",
"product_id": "CSAFPID-21001"
}
},
{
"category": "product_version_range",
"name": "\u003c2022.0.5 LTS",
"product": {
"name": "Firmware \u003c2022.0.5 LTS",
"product_id": "CSAFPID-21002"
}
},
{
"category": "product_version",
"name": "2022.0.3 LTS",
"product": {
"name": "Firmware 2022.0.3 LTS",
"product_id": "CSAFPID-22001"
}
},
{
"category": "product_version",
"name": "2022.0.5 LTS",
"product": {
"name": "Firmware 2022.0.5 LTS",
"product_id": "CSAFPID-22002"
}
}
],
"category": "product_family",
"name": "Firmware"
}
],
"category": "vendor",
"name": "PHOENIX CONTACT"
}
],
"product_groups": [
{
"group_id": "CSAFGID-0001",
"product_ids": [
"CSAFPID-31001",
"CSAFPID-31002",
"CSAFPID-31003",
"CSAFPID-31004"
],
"summary": "Affected Products."
},
{
"group_id": "CSAFGID-0002",
"product_ids": [
"CSAFPID-32001",
"CSAFPID-32002",
"CSAFPID-32003",
"CSAFPID-32004"
],
"summary": "Fixed Products."
}
],
"relationships": [
{
"category": "installed_on",
"full_product_name": {
"name": "Firmware \u003c2022.0.3 LTS installed on AXC F 1152",
"product_id": "CSAFPID-31001"
},
"product_reference": "CSAFPID-21001",
"relates_to_product_reference": "CSAFPID-11001"
},
{
"category": "installed_on",
"full_product_name": {
"name": "Firmware \u003c2022.0.3 LTS installed on AXC F 2152",
"product_id": "CSAFPID-31002"
},
"product_reference": "CSAFPID-21001",
"relates_to_product_reference": "CSAFPID-11002"
},
{
"category": "installed_on",
"full_product_name": {
"name": "Firmware \u003c2022.0.5 LTS installed on AXC F 3152",
"product_id": "CSAFPID-31003"
},
"product_reference": "CSAFPID-21002",
"relates_to_product_reference": "CSAFPID-11003"
},
{
"category": "installed_on",
"full_product_name": {
"name": "Firmware \u003c2022.0.5 LTS installed on RFC 4072",
"product_id": "CSAFPID-31004"
},
"product_reference": "CSAFPID-21002",
"relates_to_product_reference": "CSAFPID-11004"
},
{
"category": "installed_on",
"full_product_name": {
"name": "Firmware 2022.0.3 LTS installed on AXC F 1152",
"product_id": "CSAFPID-32001"
},
"product_reference": "CSAFPID-22001",
"relates_to_product_reference": "CSAFPID-11001"
},
{
"category": "installed_on",
"full_product_name": {
"name": "Firmware 2022.0.3 LTS installed on AXC F 2152",
"product_id": "CSAFPID-32002"
},
"product_reference": "CSAFPID-22001",
"relates_to_product_reference": "CSAFPID-11002"
},
{
"category": "installed_on",
"full_product_name": {
"name": "Firmware 2022.0.5 LTS installed on AXC F 3152",
"product_id": "CSAFPID-32003"
},
"product_reference": "CSAFPID-22002",
"relates_to_product_reference": "CSAFPID-11003"
},
{
"category": "installed_on",
"full_product_name": {
"name": "Firmware 2022.0.5 LTS installed on RFC 4072",
"product_id": "CSAFPID-32004"
},
"product_reference": "CSAFPID-22002",
"relates_to_product_reference": "CSAFPID-11004"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2022-22826",
"cwe": {
"id": "CWE-190",
"name": "Integer Overflow or Wraparound"
},
"notes": [
{
"category": "description",
"text": "nextScaffoldPart in xmlparse.c in Expat (aka libexpat) before 2.4.3 has an integer overflow.",
"title": "Vulnerability Description"
}
],
"product_status": {
"fixed": [
"CSAFPID-32001",
"CSAFPID-32002",
"CSAFPID-32003",
"CSAFPID-32004"
],
"known_affected": [
"CSAFPID-31001",
"CSAFPID-31002",
"CSAFPID-31003",
"CSAFPID-31004"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Phoenix Contact recommends operating network-capable devices in closed networks or protected with a suitable firewall. For detailed information on our recommendations for measures to protect network-capable devices, please refer to our application note: Measures to protect network-capable devices with Ethernet connection",
"group_ids": [
"CSAFGID-0001"
]
},
{
"category": "vendor_fix",
"details": "**Update to Firmware Release 2022.0.3 LTS or higher:**\n\n- AXC F 2152 (2404267) [Download](http://www.phoenixcontact.net/qr/2404267/firmware) \n- AXC F 1152 (1151412) [Download](http://www.phoenixcontact.net/qr/1151412/firmware) \n- AXC F 3152 (1069208) Not yet released\n\n**Update to PLCnext Engineer Release 2022.0.1 LTS or higher.**",
"group_ids": [
"CSAFGID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"environmentalScore": 8.8,
"environmentalSeverity": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"temporalScore": 8.8,
"temporalSeverity": "HIGH",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-31001",
"CSAFPID-31002",
"CSAFPID-31003",
"CSAFPID-31004"
]
}
],
"title": "CVE-2022-22826"
},
{
"cve": "CVE-2022-22825",
"cwe": {
"id": "CWE-190",
"name": "Integer Overflow or Wraparound"
},
"notes": [
{
"category": "description",
"text": "lookup in xmlparse.c in Expat (aka libexpat) before 2.4.3 has an integer overflow.",
"title": "Vulnerability Description"
}
],
"product_status": {
"fixed": [
"CSAFPID-32001",
"CSAFPID-32002",
"CSAFPID-32003",
"CSAFPID-32004"
],
"known_affected": [
"CSAFPID-31001",
"CSAFPID-31002",
"CSAFPID-31003",
"CSAFPID-31004"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Phoenix Contact recommends operating network-capable devices in closed networks or protected with a suitable firewall. For detailed information on our recommendations for measures to protect network-capable devices, please refer to our application note: Measures to protect network-capable devices with Ethernet connection",
"group_ids": [
"CSAFGID-0001"
]
},
{
"category": "vendor_fix",
"details": "**Update to Firmware Release 2022.0.3 LTS or higher:**\n\n- AXC F 2152 (2404267) [Download](http://www.phoenixcontact.net/qr/2404267/firmware) \n- AXC F 1152 (1151412) [Download](http://www.phoenixcontact.net/qr/1151412/firmware) \n- AXC F 3152 (1069208) Not yet released\n\n**Update to PLCnext Engineer Release 2022.0.1 LTS or higher.**",
"group_ids": [
"CSAFGID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"environmentalScore": 8.8,
"environmentalSeverity": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"temporalScore": 8.8,
"temporalSeverity": "HIGH",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-31001",
"CSAFPID-31002",
"CSAFPID-31003",
"CSAFPID-31004"
]
}
],
"title": "CVE-2022-22825"
},
{
"cve": "CVE-2022-22824",
"cwe": {
"id": "CWE-190",
"name": "Integer Overflow or Wraparound"
},
"notes": [
{
"category": "description",
"text": "defineAttribute in xmlparse.c in Expat (aka libexpat) before 2.4.3 has an integer overflow.",
"title": "Vulnerability Description"
}
],
"product_status": {
"fixed": [
"CSAFPID-32001",
"CSAFPID-32002",
"CSAFPID-32003",
"CSAFPID-32004"
],
"known_affected": [
"CSAFPID-31001",
"CSAFPID-31002",
"CSAFPID-31003",
"CSAFPID-31004"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Phoenix Contact recommends operating network-capable devices in closed networks or protected with a suitable firewall. For detailed information on our recommendations for measures to protect network-capable devices, please refer to our application note: Measures to protect network-capable devices with Ethernet connection",
"group_ids": [
"CSAFGID-0001"
]
},
{
"category": "vendor_fix",
"details": "**Update to Firmware Release 2022.0.3 LTS or higher:**\n\n- AXC F 2152 (2404267) [Download](http://www.phoenixcontact.net/qr/2404267/firmware) \n- AXC F 1152 (1151412) [Download](http://www.phoenixcontact.net/qr/1151412/firmware) \n- AXC F 3152 (1069208) Not yet released\n\n**Update to PLCnext Engineer Release 2022.0.1 LTS or higher.**",
"group_ids": [
"CSAFGID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"environmentalScore": 9.8,
"environmentalSeverity": "CRITICAL",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"temporalScore": 9.8,
"temporalSeverity": "CRITICAL",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-31001",
"CSAFPID-31002",
"CSAFPID-31003",
"CSAFPID-31004"
]
}
],
"title": "CVE-2022-22824"
},
{
"cve": "CVE-2022-22823",
"cwe": {
"id": "CWE-190",
"name": "Integer Overflow or Wraparound"
},
"notes": [
{
"category": "description",
"text": "build_model in xmlparse.c in Expat (aka libexpat) before 2.4.3 has an integer overflow.",
"title": "Vulnerability Description"
}
],
"product_status": {
"fixed": [
"CSAFPID-32001",
"CSAFPID-32002",
"CSAFPID-32003",
"CSAFPID-32004"
],
"known_affected": [
"CSAFPID-31001",
"CSAFPID-31002",
"CSAFPID-31003",
"CSAFPID-31004"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Phoenix Contact recommends operating network-capable devices in closed networks or protected with a suitable firewall. For detailed information on our recommendations for measures to protect network-capable devices, please refer to our application note: Measures to protect network-capable devices with Ethernet connection",
"group_ids": [
"CSAFGID-0001"
]
},
{
"category": "vendor_fix",
"details": "**Update to Firmware Release 2022.0.3 LTS or higher:**\n\n- AXC F 2152 (2404267) [Download](http://www.phoenixcontact.net/qr/2404267/firmware) \n- AXC F 1152 (1151412) [Download](http://www.phoenixcontact.net/qr/1151412/firmware) \n- AXC F 3152 (1069208) Not yet released\n\n**Update to PLCnext Engineer Release 2022.0.1 LTS or higher.**",
"group_ids": [
"CSAFGID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"environmentalScore": 9.8,
"environmentalSeverity": "CRITICAL",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"temporalScore": 9.8,
"temporalSeverity": "CRITICAL",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-31001",
"CSAFPID-31002",
"CSAFPID-31003",
"CSAFPID-31004"
]
}
],
"title": "CVE-2022-22823"
},
{
"cve": "CVE-2022-22822",
"cwe": {
"id": "CWE-190",
"name": "Integer Overflow or Wraparound"
},
"notes": [
{
"category": "description",
"text": "addBinding in xmlparse.c in Expat (aka libexpat) before 2.4.3 has an integer overflow.",
"title": "Vulnerability Description"
}
],
"product_status": {
"fixed": [
"CSAFPID-32001",
"CSAFPID-32002",
"CSAFPID-32003",
"CSAFPID-32004"
],
"known_affected": [
"CSAFPID-31001",
"CSAFPID-31002",
"CSAFPID-31003",
"CSAFPID-31004"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Phoenix Contact recommends operating network-capable devices in closed networks or protected with a suitable firewall. For detailed information on our recommendations for measures to protect network-capable devices, please refer to our application note: Measures to protect network-capable devices with Ethernet connection",
"group_ids": [
"CSAFGID-0001"
]
},
{
"category": "vendor_fix",
"details": "**Update to Firmware Release 2022.0.3 LTS or higher:**\n\n- AXC F 2152 (2404267) [Download](http://www.phoenixcontact.net/qr/2404267/firmware) \n- AXC F 1152 (1151412) [Download](http://www.phoenixcontact.net/qr/1151412/firmware) \n- AXC F 3152 (1069208) Not yet released\n\n**Update to PLCnext Engineer Release 2022.0.1 LTS or higher.**",
"group_ids": [
"CSAFGID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"environmentalScore": 9.8,
"environmentalSeverity": "CRITICAL",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"temporalScore": 9.8,
"temporalSeverity": "CRITICAL",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-31001",
"CSAFPID-31002",
"CSAFPID-31003",
"CSAFPID-31004"
]
}
],
"title": "CVE-2022-22822"
},
{
"cve": "CVE-2021-45117",
"cwe": {
"id": "CWE-476",
"name": "NULL Pointer Dereference"
},
"notes": [
{
"category": "description",
"text": "The OPC autogenerated ANSI C stack stubs (in the NodeSets) do not handle all error cases. This can lead to a NULL pointer dereference.",
"title": "Vulnerability Description"
}
],
"product_status": {
"fixed": [
"CSAFPID-32001",
"CSAFPID-32002",
"CSAFPID-32003",
"CSAFPID-32004"
],
"known_affected": [
"CSAFPID-31001",
"CSAFPID-31002",
"CSAFPID-31003",
"CSAFPID-31004"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Phoenix Contact recommends operating network-capable devices in closed networks or protected with a suitable firewall. For detailed information on our recommendations for measures to protect network-capable devices, please refer to our application note: Measures to protect network-capable devices with Ethernet connection",
"group_ids": [
"CSAFGID-0001"
]
},
{
"category": "vendor_fix",
"details": "**Update to Firmware Release 2022.0.3 LTS or higher:**\n\n- AXC F 2152 (2404267) [Download](http://www.phoenixcontact.net/qr/2404267/firmware) \n- AXC F 1152 (1151412) [Download](http://www.phoenixcontact.net/qr/1151412/firmware) \n- AXC F 3152 (1069208) Not yet released\n\n**Update to PLCnext Engineer Release 2022.0.1 LTS or higher.**",
"group_ids": [
"CSAFGID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"environmentalScore": 6.5,
"environmentalSeverity": "MEDIUM",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"temporalScore": 6.5,
"temporalSeverity": "MEDIUM",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-31001",
"CSAFPID-31002",
"CSAFPID-31003",
"CSAFPID-31004"
]
}
],
"title": "CVE-2021-45117"
},
{
"cve": "CVE-2021-45960",
"cwe": {
"id": "CWE-682",
"name": "Incorrect Calculation"
},
"notes": [
{
"category": "description",
"text": "In Expat (aka libexpat) before 2.4.3, a left shift by 29 (or more) places in the storeAtts function in xmlparse.c can lead to realloc misbehavior (e.g., allocating too few bytes, or only freeing memory).",
"title": "Vulnerability Description"
}
],
"product_status": {
"fixed": [
"CSAFPID-32001",
"CSAFPID-32002",
"CSAFPID-32003",
"CSAFPID-32004"
],
"known_affected": [
"CSAFPID-31001",
"CSAFPID-31002",
"CSAFPID-31003",
"CSAFPID-31004"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Phoenix Contact recommends operating network-capable devices in closed networks or protected with a suitable firewall. For detailed information on our recommendations for measures to protect network-capable devices, please refer to our application note: Measures to protect network-capable devices with Ethernet connection",
"group_ids": [
"CSAFGID-0001"
]
},
{
"category": "vendor_fix",
"details": "**Update to Firmware Release 2022.0.3 LTS or higher:**\n\n- AXC F 2152 (2404267) [Download](http://www.phoenixcontact.net/qr/2404267/firmware) \n- AXC F 1152 (1151412) [Download](http://www.phoenixcontact.net/qr/1151412/firmware) \n- AXC F 3152 (1069208) Not yet released\n\n**Update to PLCnext Engineer Release 2022.0.1 LTS or higher.**",
"group_ids": [
"CSAFGID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"environmentalScore": 8.8,
"environmentalSeverity": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"temporalScore": 8.8,
"temporalSeverity": "HIGH",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-31001",
"CSAFPID-31002",
"CSAFPID-31003",
"CSAFPID-31004"
]
}
],
"title": "CVE-2021-45960"
},
{
"cve": "CVE-2020-15078",
"cwe": {
"id": "CWE-306",
"name": "Missing Authentication for Critical Function"
},
"notes": [
{
"category": "description",
"text": "OpenVPN 2.5.1 and earlier versions allows a remote attackers to bypass authentication and access control channel data on servers configured with deferred authentication, which can be used to potentially trigger further information leaks.",
"title": "Vulnerability Description"
}
],
"product_status": {
"fixed": [
"CSAFPID-32001",
"CSAFPID-32002",
"CSAFPID-32003",
"CSAFPID-32004"
],
"known_affected": [
"CSAFPID-31001",
"CSAFPID-31002",
"CSAFPID-31003",
"CSAFPID-31004"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Phoenix Contact recommends operating network-capable devices in closed networks or protected with a suitable firewall. For detailed information on our recommendations for measures to protect network-capable devices, please refer to our application note: Measures to protect network-capable devices with Ethernet connection",
"group_ids": [
"CSAFGID-0001"
]
},
{
"category": "vendor_fix",
"details": "**Update to Firmware Release 2022.0.3 LTS or higher:**\n\n- AXC F 2152 (2404267) [Download](http://www.phoenixcontact.net/qr/2404267/firmware) \n- AXC F 1152 (1151412) [Download](http://www.phoenixcontact.net/qr/1151412/firmware) \n- AXC F 3152 (1069208) Not yet released\n\n**Update to PLCnext Engineer Release 2022.0.1 LTS or higher.**",
"group_ids": [
"CSAFGID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"environmentalScore": 7.5,
"environmentalSeverity": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"temporalScore": 7.5,
"temporalSeverity": "HIGH",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-31001",
"CSAFPID-31002",
"CSAFPID-31003",
"CSAFPID-31004"
]
}
],
"title": "CVE-2020-15078"
},
{
"cve": "CVE-2021-3518",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"notes": [
{
"category": "description",
"text": "There\u0027s a flaw in libxml2 in versions before 2.9.11. An attacker who is able to submit a crafted file to be processed by an application linked with libxml2 could trigger a use-after-free. The greatest impact from this flaw is to confidentiality, integrity, and availability.",
"title": "Vulnerability Description"
}
],
"product_status": {
"fixed": [
"CSAFPID-32001",
"CSAFPID-32002",
"CSAFPID-32003",
"CSAFPID-32004"
],
"known_affected": [
"CSAFPID-31001",
"CSAFPID-31002",
"CSAFPID-31003",
"CSAFPID-31004"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Phoenix Contact recommends operating network-capable devices in closed networks or protected with a suitable firewall. For detailed information on our recommendations for measures to protect network-capable devices, please refer to our application note: Measures to protect network-capable devices with Ethernet connection",
"group_ids": [
"CSAFGID-0001"
]
},
{
"category": "vendor_fix",
"details": "**Update to Firmware Release 2022.0.3 LTS or higher:**\n\n- AXC F 2152 (2404267) [Download](http://www.phoenixcontact.net/qr/2404267/firmware) \n- AXC F 1152 (1151412) [Download](http://www.phoenixcontact.net/qr/1151412/firmware) \n- AXC F 3152 (1069208) Not yet released\n\n**Update to PLCnext Engineer Release 2022.0.1 LTS or higher.**",
"group_ids": [
"CSAFGID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"environmentalScore": 8.8,
"environmentalSeverity": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"temporalScore": 8.8,
"temporalSeverity": "HIGH",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-31001",
"CSAFPID-31002",
"CSAFPID-31003",
"CSAFPID-31004"
]
}
],
"title": "CVE-2021-3518"
},
{
"cve": "CVE-2019-18276",
"cwe": {
"id": "CWE-273",
"name": "Improper Check for Dropped Privileges"
},
"notes": [
{
"category": "description",
"text": "An issue was discovered in disable_priv_mode in shell.c in GNU Bash through 5.0 patch 11. By default, if Bash is run with its effective UID not equal to its real UID, it will drop privileges by setting its effective UID to its real UID. However, it does so incorrectly. On Linux and other systems that support \"saved UID\" functionality, the saved UID is not dropped. An attacker with command execution in the shell can use \"enable -f\" for runtime loading of a new builtin, which can be a shared object that calls setuid() and therefore regains privileges. However, binaries running with an effective UID of 0 are unaffected.",
"title": "Vulnerability Description"
}
],
"product_status": {
"fixed": [
"CSAFPID-32001",
"CSAFPID-32002",
"CSAFPID-32003",
"CSAFPID-32004"
],
"known_affected": [
"CSAFPID-31001",
"CSAFPID-31002",
"CSAFPID-31003",
"CSAFPID-31004"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Phoenix Contact recommends operating network-capable devices in closed networks or protected with a suitable firewall. For detailed information on our recommendations for measures to protect network-capable devices, please refer to our application note: Measures to protect network-capable devices with Ethernet connection",
"group_ids": [
"CSAFGID-0001"
]
},
{
"category": "vendor_fix",
"details": "**Update to Firmware Release 2022.0.3 LTS or higher:**\n\n- AXC F 2152 (2404267) [Download](http://www.phoenixcontact.net/qr/2404267/firmware) \n- AXC F 1152 (1151412) [Download](http://www.phoenixcontact.net/qr/1151412/firmware) \n- AXC F 3152 (1069208) Not yet released\n\n**Update to PLCnext Engineer Release 2022.0.1 LTS or higher.**",
"group_ids": [
"CSAFGID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"environmentalScore": 7.8,
"environmentalSeverity": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"temporalScore": 7.8,
"temporalSeverity": "HIGH",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-31001",
"CSAFPID-31002",
"CSAFPID-31003",
"CSAFPID-31004"
]
}
],
"title": "CVE-2019-18276"
},
{
"cve": "CVE-2021-42385",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"notes": [
{
"category": "description",
"text": "A use-after-free in Busybox\u0027s awk applet leads to denial of service and possibly code execution when processing a crafted awk pattern in the evaluate function",
"title": "Vulnerability Description"
}
],
"product_status": {
"fixed": [
"CSAFPID-32001",
"CSAFPID-32002",
"CSAFPID-32003",
"CSAFPID-32004"
],
"known_affected": [
"CSAFPID-31001",
"CSAFPID-31002",
"CSAFPID-31003",
"CSAFPID-31004"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Phoenix Contact recommends operating network-capable devices in closed networks or protected with a suitable firewall. For detailed information on our recommendations for measures to protect network-capable devices, please refer to our application note: Measures to protect network-capable devices with Ethernet connection",
"group_ids": [
"CSAFGID-0001"
]
},
{
"category": "vendor_fix",
"details": "**Update to Firmware Release 2022.0.3 LTS or higher:**\n\n- AXC F 2152 (2404267) [Download](http://www.phoenixcontact.net/qr/2404267/firmware) \n- AXC F 1152 (1151412) [Download](http://www.phoenixcontact.net/qr/1151412/firmware) \n- AXC F 3152 (1069208) Not yet released\n\n**Update to PLCnext Engineer Release 2022.0.1 LTS or higher.**",
"group_ids": [
"CSAFGID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.2,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"environmentalScore": 7.2,
"environmentalSeverity": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"temporalScore": 7.2,
"temporalSeverity": "HIGH",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-31001",
"CSAFPID-31002",
"CSAFPID-31003",
"CSAFPID-31004"
]
}
],
"title": "CVE-2021-42385"
},
{
"cve": "CVE-2021-42374",
"cwe": {
"id": "CWE-125",
"name": "Out-of-bounds Read"
},
"notes": [
{
"category": "description",
"text": "An out-of-bounds heap read in Busybox\u0027s unlzma applet leads to information leak and denial of service when crafted LZMA-compressed input is decompressed. This can be triggered by any applet/format that",
"title": "Vulnerability Description"
}
],
"product_status": {
"fixed": [
"CSAFPID-32001",
"CSAFPID-32002",
"CSAFPID-32003",
"CSAFPID-32004"
],
"known_affected": [
"CSAFPID-31001",
"CSAFPID-31002",
"CSAFPID-31003",
"CSAFPID-31004"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Phoenix Contact recommends operating network-capable devices in closed networks or protected with a suitable firewall. For detailed information on our recommendations for measures to protect network-capable devices, please refer to our application note: Measures to protect network-capable devices with Ethernet connection",
"group_ids": [
"CSAFGID-0001"
]
},
{
"category": "vendor_fix",
"details": "**Update to Firmware Release 2022.0.3 LTS or higher:**\n\n- AXC F 2152 (2404267) [Download](http://www.phoenixcontact.net/qr/2404267/firmware) \n- AXC F 1152 (1151412) [Download](http://www.phoenixcontact.net/qr/1151412/firmware) \n- AXC F 3152 (1069208) Not yet released\n\n**Update to PLCnext Engineer Release 2022.0.1 LTS or higher.**",
"group_ids": [
"CSAFGID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"environmentalScore": 5.3,
"environmentalSeverity": "MEDIUM",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"temporalScore": 5.3,
"temporalSeverity": "MEDIUM",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-31001",
"CSAFPID-31002",
"CSAFPID-31003",
"CSAFPID-31004"
]
}
],
"title": "CVE-2021-42374"
},
{
"cve": "CVE-2021-46143",
"cwe": {
"id": "CWE-190",
"name": "Integer Overflow or Wraparound"
},
"notes": [
{
"category": "description",
"text": "In doProlog in xmlparse.c in Expat (aka libexpat) before 2.4.3, an integer overflow exists for m_groupSize.",
"title": "Vulnerability Description"
}
],
"product_status": {
"fixed": [
"CSAFPID-32001",
"CSAFPID-32002",
"CSAFPID-32003",
"CSAFPID-32004"
],
"known_affected": [
"CSAFPID-31001",
"CSAFPID-31002",
"CSAFPID-31003",
"CSAFPID-31004"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Phoenix Contact recommends operating network-capable devices in closed networks or protected with a suitable firewall. For detailed information on our recommendations for measures to protect network-capable devices, please refer to our application note: Measures to protect network-capable devices with Ethernet connection",
"group_ids": [
"CSAFGID-0001"
]
},
{
"category": "vendor_fix",
"details": "**Update to Firmware Release 2022.0.3 LTS or higher:**\n\n- AXC F 2152 (2404267) [Download](http://www.phoenixcontact.net/qr/2404267/firmware) \n- AXC F 1152 (1151412) [Download](http://www.phoenixcontact.net/qr/1151412/firmware) \n- AXC F 3152 (1069208) Not yet released\n\n**Update to PLCnext Engineer Release 2022.0.1 LTS or higher.**",
"group_ids": [
"CSAFGID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"environmentalScore": 7.8,
"environmentalSeverity": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"temporalScore": 7.8,
"temporalSeverity": "HIGH",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-31001",
"CSAFPID-31002",
"CSAFPID-31003",
"CSAFPID-31004"
]
}
],
"title": "CVE-2021-46143"
},
{
"cve": "CVE-2022-23852",
"cwe": {
"id": "CWE-190",
"name": "Integer Overflow or Wraparound"
},
"notes": [
{
"category": "description",
"text": "Expat (aka libexpat) before 2.4.4 has a signed integer overflow in XML_GetBuffer, for configurations with a nonzero XML_CONTEXT_BYTES.",
"title": "Vulnerability Description"
}
],
"product_status": {
"fixed": [
"CSAFPID-32001",
"CSAFPID-32002",
"CSAFPID-32003",
"CSAFPID-32004"
],
"known_affected": [
"CSAFPID-31001",
"CSAFPID-31002",
"CSAFPID-31003",
"CSAFPID-31004"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Phoenix Contact recommends operating network-capable devices in closed networks or protected with a suitable firewall. For detailed information on our recommendations for measures to protect network-capable devices, please refer to our application note: Measures to protect network-capable devices with Ethernet connection",
"group_ids": [
"CSAFGID-0001"
]
},
{
"category": "vendor_fix",
"details": "**Update to Firmware Release 2022.0.3 LTS or higher:**\n\n- AXC F 2152 (2404267) [Download](http://www.phoenixcontact.net/qr/2404267/firmware) \n- AXC F 1152 (1151412) [Download](http://www.phoenixcontact.net/qr/1151412/firmware) \n- AXC F 3152 (1069208) Not yet released\n\n**Update to PLCnext Engineer Release 2022.0.1 LTS or higher.**",
"group_ids": [
"CSAFGID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"environmentalScore": 9.8,
"environmentalSeverity": "CRITICAL",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"temporalScore": 9.8,
"temporalSeverity": "CRITICAL",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-31001",
"CSAFPID-31002",
"CSAFPID-31003",
"CSAFPID-31004"
]
}
],
"title": "CVE-2022-23852"
},
{
"cve": "CVE-2022-22827",
"cwe": {
"id": "CWE-190",
"name": "Integer Overflow or Wraparound"
},
"notes": [
{
"category": "description",
"text": "storeAtts in xmlparse.c in Expat (aka libexpat) before 2.4.3 has an integer overflow.",
"title": "Vulnerability Description"
}
],
"product_status": {
"fixed": [
"CSAFPID-32001",
"CSAFPID-32002",
"CSAFPID-32003",
"CSAFPID-32004"
],
"known_affected": [
"CSAFPID-31001",
"CSAFPID-31002",
"CSAFPID-31003",
"CSAFPID-31004"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Phoenix Contact recommends operating network-capable devices in closed networks or protected with a suitable firewall. For detailed information on our recommendations for measures to protect network-capable devices, please refer to our application note: Measures to protect network-capable devices with Ethernet connection",
"group_ids": [
"CSAFGID-0001"
]
},
{
"category": "vendor_fix",
"details": "**Update to Firmware Release 2022.0.3 LTS or higher:**\n\n- AXC F 2152 (2404267) [Download](http://www.phoenixcontact.net/qr/2404267/firmware) \n- AXC F 1152 (1151412) [Download](http://www.phoenixcontact.net/qr/1151412/firmware) \n- AXC F 3152 (1069208) Not yet released\n\n**Update to PLCnext Engineer Release 2022.0.1 LTS or higher.**",
"group_ids": [
"CSAFGID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"environmentalScore": 8.8,
"environmentalSeverity": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"temporalScore": 8.8,
"temporalSeverity": "HIGH",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-31001",
"CSAFPID-31002",
"CSAFPID-31003",
"CSAFPID-31004"
]
}
],
"title": "CVE-2022-22827"
},
{
"cve": "CVE-2022-23990",
"cwe": {
"id": "CWE-190",
"name": "Integer Overflow or Wraparound"
},
"notes": [
{
"category": "description",
"text": "Expat (aka libexpat) before 2.4.4 has an integer overflow in the doProlog function.",
"title": "Vulnerability Description"
}
],
"product_status": {
"fixed": [
"CSAFPID-32001",
"CSAFPID-32002",
"CSAFPID-32003",
"CSAFPID-32004"
],
"known_affected": [
"CSAFPID-31001",
"CSAFPID-31002",
"CSAFPID-31003",
"CSAFPID-31004"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Phoenix Contact recommends operating network-capable devices in closed networks or protected with a suitable firewall. For detailed information on our recommendations for measures to protect network-capable devices, please refer to our application note: Measures to protect network-capable devices with Ethernet connection",
"group_ids": [
"CSAFGID-0001"
]
},
{
"category": "vendor_fix",
"details": "**Update to Firmware Release 2022.0.3 LTS or higher:**\n\n- AXC F 2152 (2404267) [Download](http://www.phoenixcontact.net/qr/2404267/firmware) \n- AXC F 1152 (1151412) [Download](http://www.phoenixcontact.net/qr/1151412/firmware) \n- AXC F 3152 (1069208) Not yet released\n\n**Update to PLCnext Engineer Release 2022.0.1 LTS or higher.**",
"group_ids": [
"CSAFGID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"environmentalScore": 7.5,
"environmentalSeverity": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"temporalScore": 7.5,
"temporalSeverity": "HIGH",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-31001",
"CSAFPID-31002",
"CSAFPID-31003",
"CSAFPID-31004"
]
}
],
"title": "CVE-2022-23990"
},
{
"cve": "CVE-2021-3712",
"cwe": {
"id": "CWE-125",
"name": "Out-of-bounds Read"
},
"notes": [
{
"category": "description",
"text": "ASN.1 strings are represented internally within OpenSSL as an ASN1_STRING structure which contains a buffer holding the string data and a field holding the buffer length. This contrasts with normal C strings which are repesented as a buffer for the string data which is terminated with a NUL (0) byte. Although not a strict requirement, ASN.1 strings that are parsed using OpenSSL\u0027s own \"d2i\" functions (and other similar parsing functions) as well as any string whose value has been set with the ASN1_STRING_set() function will additionally NUL terminate the byte array in the ASN1_STRING structure. However, it is possible for applications to directly construct valid ASN1_STRING structures which do not NUL terminate the byte array by directly setting the \"data\" and \"length\" fields in the ASN1_STRING array. This can also happen by using the ASN1_STRING_set0() function. Numerous OpenSSL functions that print ASN.1 data have been found to assume that the ASN1_STRING byte array will be NUL terminated, even though this is not guaranteed for strings that have been directly constructed. Where an application requests an ASN.1 structure to be printed, and where that ASN.1 structure contains ASN1_STRINGs that have been directly constructed by the application without NUL terminating the \"data\" field, then a read buffer overrun can occur. The same thing can also occur during name constraints processing of certificates (for example if a certificate has been directly constructed by the application instead of loading it via the OpenSSL parsing functions, and the certificate contains non NUL terminated ASN1_STRING structures). It can also occur in the X509_get1_email(), X509_REQ_get1_email() and X509_get1_ocsp() functions. If a malicious actor can cause an application to directly construct an ASN1_STRING and then process it through one of the affected OpenSSL functions then this issue could be hit. This might result in a crash (causing a Denial of Service attack). It could also result in the disclosure of private memory contents (such as private keys, or sensitive plaintext). Fixed in OpenSSL 1.1.1l (Affected 1.1.1-1.1.1k). Fixed in OpenSSL 1.0.2za (Affected 1.0.2-1.0.2y).",
"title": "Vulnerability Description"
}
],
"product_status": {
"fixed": [
"CSAFPID-32001",
"CSAFPID-32002",
"CSAFPID-32003",
"CSAFPID-32004"
],
"known_affected": [
"CSAFPID-31001",
"CSAFPID-31002",
"CSAFPID-31003",
"CSAFPID-31004"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Phoenix Contact recommends operating network-capable devices in closed networks or protected with a suitable firewall. For detailed information on our recommendations for measures to protect network-capable devices, please refer to our application note: Measures to protect network-capable devices with Ethernet connection",
"group_ids": [
"CSAFGID-0001"
]
},
{
"category": "vendor_fix",
"details": "**Update to Firmware Release 2022.0.3 LTS or higher:**\n\n- AXC F 2152 (2404267) [Download](http://www.phoenixcontact.net/qr/2404267/firmware) \n- AXC F 1152 (1151412) [Download](http://www.phoenixcontact.net/qr/1151412/firmware) \n- AXC F 3152 (1069208) Not yet released\n\n**Update to PLCnext Engineer Release 2022.0.1 LTS or higher.**",
"group_ids": [
"CSAFGID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.4,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"environmentalScore": 7.4,
"environmentalSeverity": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"temporalScore": 7.4,
"temporalSeverity": "HIGH",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-31001",
"CSAFPID-31002",
"CSAFPID-31003",
"CSAFPID-31004"
]
}
],
"title": "CVE-2021-3712"
},
{
"cve": "CVE-2021-3711",
"cwe": {
"id": "CWE-120",
"name": "Buffer Copy without Checking Size of Input (\u0027Classic Buffer Overflow\u0027)"
},
"notes": [
{
"category": "description",
"text": "In order to decrypt SM2 encrypted data an application is expected to call the API function EVP_PKEY_decrypt(). Typically an application will call this function twice. The first time, on entry, the \"out\" parameter can be NULL and, on exit, the \"outlen\" parameter is populated with the buffer size required to hold the decrypted plaintext. The application can then allocate a sufficiently sized buffer and call EVP_PKEY_decrypt() again, but this time passing a non-NULL value for the \"out\" parameter. A bug in the implementation of the SM2 decryption code means that the calculation of the buffer size required to hold the plaintext returned by the first call to EVP_PKEY_decrypt() can be smaller than the actual size required by the second call. This can lead to a buffer overflow when EVP_PKEY_decrypt() is called by the application a second time with a buffer that is too small. A malicious attacker who is able present SM2 content for decryption to an application could cause attacker chosen data to overflow the buffer by up to a maximum of 62 bytes altering the contents of other data held after the buffer, possibly changing application behaviour or causing the application to crash. The location of the buffer is application dependent but is typically heap allocated. Fixed in OpenSSL 1.1.1l (Affected 1.1.1-1.1.1k).",
"title": "Vulnerability Description"
}
],
"product_status": {
"fixed": [
"CSAFPID-32001",
"CSAFPID-32002",
"CSAFPID-32003",
"CSAFPID-32004"
],
"known_affected": [
"CSAFPID-31001",
"CSAFPID-31002",
"CSAFPID-31003",
"CSAFPID-31004"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Phoenix Contact recommends operating network-capable devices in closed networks or protected with a suitable firewall. For detailed information on our recommendations for measures to protect network-capable devices, please refer to our application note: Measures to protect network-capable devices with Ethernet connection",
"group_ids": [
"CSAFGID-0001"
]
},
{
"category": "vendor_fix",
"details": "**Update to Firmware Release 2022.0.3 LTS or higher:**\n\n- AXC F 2152 (2404267) [Download](http://www.phoenixcontact.net/qr/2404267/firmware) \n- AXC F 1152 (1151412) [Download](http://www.phoenixcontact.net/qr/1151412/firmware) \n- AXC F 3152 (1069208) Not yet released\n\n**Update to PLCnext Engineer Release 2022.0.1 LTS or higher.**",
"group_ids": [
"CSAFGID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"environmentalScore": 9.8,
"environmentalSeverity": "CRITICAL",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"temporalScore": 9.8,
"temporalSeverity": "CRITICAL",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-31001",
"CSAFPID-31002",
"CSAFPID-31003",
"CSAFPID-31004"
]
}
],
"title": "CVE-2021-3711"
},
{
"cve": "CVE-2021-41990",
"cwe": {
"id": "CWE-190",
"name": "Integer Overflow or Wraparound"
},
"notes": [
{
"category": "description",
"text": "The gmp plugin in strongSwan before 5.9.4 has a remote integer overflow via a crafted certificate with an RSASSA-PSS signature. For example, this can be triggered by an unrelated self-signed CA certificate sent by an initiator. Remote code execution cannot occur.",
"title": "Vulnerability Description"
}
],
"product_status": {
"fixed": [
"CSAFPID-32001",
"CSAFPID-32002",
"CSAFPID-32003",
"CSAFPID-32004"
],
"known_affected": [
"CSAFPID-31001",
"CSAFPID-31002",
"CSAFPID-31003",
"CSAFPID-31004"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Phoenix Contact recommends operating network-capable devices in closed networks or protected with a suitable firewall. For detailed information on our recommendations for measures to protect network-capable devices, please refer to our application note: Measures to protect network-capable devices with Ethernet connection",
"group_ids": [
"CSAFGID-0001"
]
},
{
"category": "vendor_fix",
"details": "**Update to Firmware Release 2022.0.3 LTS or higher:**\n\n- AXC F 2152 (2404267) [Download](http://www.phoenixcontact.net/qr/2404267/firmware) \n- AXC F 1152 (1151412) [Download](http://www.phoenixcontact.net/qr/1151412/firmware) \n- AXC F 3152 (1069208) Not yet released\n\n**Update to PLCnext Engineer Release 2022.0.1 LTS or higher.**",
"group_ids": [
"CSAFGID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"environmentalScore": 7.5,
"environmentalSeverity": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"temporalScore": 7.5,
"temporalSeverity": "HIGH",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-31001",
"CSAFPID-31002",
"CSAFPID-31003",
"CSAFPID-31004"
]
}
],
"title": "CVE-2021-41990"
},
{
"cve": "CVE-2020-10878",
"cwe": {
"id": "CWE-190",
"name": "Integer Overflow or Wraparound"
},
"notes": [
{
"category": "description",
"text": "Perl before 5.30.3 has an integer overflow related to mishandling of a \"PL_regkind[OP(n)] == NOTHING\" situation. A crafted regular expression could lead to malformed bytecode with a possibility of instruction injection.",
"title": "Vulnerability Description"
}
],
"product_status": {
"fixed": [
"CSAFPID-32001",
"CSAFPID-32002",
"CSAFPID-32003",
"CSAFPID-32004"
],
"known_affected": [
"CSAFPID-31001",
"CSAFPID-31002",
"CSAFPID-31003",
"CSAFPID-31004"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Phoenix Contact recommends operating network-capable devices in closed networks or protected with a suitable firewall. For detailed information on our recommendations for measures to protect network-capable devices, please refer to our application note: Measures to protect network-capable devices with Ethernet connection",
"group_ids": [
"CSAFGID-0001"
]
},
{
"category": "vendor_fix",
"details": "**Update to Firmware Release 2022.0.3 LTS or higher:**\n\n- AXC F 2152 (2404267) [Download](http://www.phoenixcontact.net/qr/2404267/firmware) \n- AXC F 1152 (1151412) [Download](http://www.phoenixcontact.net/qr/1151412/firmware) \n- AXC F 3152 (1069208) Not yet released\n\n**Update to PLCnext Engineer Release 2022.0.1 LTS or higher.**",
"group_ids": [
"CSAFGID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.6,
"baseSeverity": "HIGH",
"confidentialityImpact": "LOW",
"environmentalScore": 8.6,
"environmentalSeverity": "HIGH",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"temporalScore": 8.6,
"temporalSeverity": "HIGH",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-31001",
"CSAFPID-31002",
"CSAFPID-31003",
"CSAFPID-31004"
]
}
],
"title": "CVE-2020-10878"
},
{
"cve": "CVE-2021-45079",
"cwe": {
"id": "CWE-476",
"name": "NULL Pointer Dereference"
},
"notes": [
{
"category": "description",
"text": "In strongSwan before 5.9.5, a malicious responder can send an EAP-Success message too early without actually authenticating the client and (in the case of EAP methods with mutual authentication and EAP-only authentication for IKEv2) even without server authentication.",
"title": "Vulnerability Description"
}
],
"product_status": {
"fixed": [
"CSAFPID-32001",
"CSAFPID-32002",
"CSAFPID-32003",
"CSAFPID-32004"
],
"known_affected": [
"CSAFPID-31001",
"CSAFPID-31002",
"CSAFPID-31003",
"CSAFPID-31004"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Phoenix Contact recommends operating network-capable devices in closed networks or protected with a suitable firewall. For detailed information on our recommendations for measures to protect network-capable devices, please refer to our application note: Measures to protect network-capable devices with Ethernet connection",
"group_ids": [
"CSAFGID-0001"
]
},
{
"category": "vendor_fix",
"details": "**Update to Firmware Release 2022.0.3 LTS or higher:**\n\n- AXC F 2152 (2404267) [Download](http://www.phoenixcontact.net/qr/2404267/firmware) \n- AXC F 1152 (1151412) [Download](http://www.phoenixcontact.net/qr/1151412/firmware) \n- AXC F 3152 (1069208) Not yet released\n\n**Update to PLCnext Engineer Release 2022.0.1 LTS or higher.**",
"group_ids": [
"CSAFGID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.1,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"environmentalScore": 9.1,
"environmentalSeverity": "CRITICAL",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"temporalScore": 9.1,
"temporalSeverity": "CRITICAL",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-31001",
"CSAFPID-31002",
"CSAFPID-31003",
"CSAFPID-31004"
]
}
],
"title": "CVE-2021-45079"
},
{
"cve": "CVE-2016-20012",
"notes": [
{
"category": "description",
"text": "OpenSSH through 8.7 allows remote attackers, who have a suspicion that a certain combination of username and public key is known to an SSH server, to test whether this suspicion is correct. This occurs because a challenge is sent only when that combination could be valid for a login session. NOTE: the vendor does not recognize user enumeration as a vulnerability for this product",
"title": "Vulnerability Description"
}
],
"product_status": {
"fixed": [
"CSAFPID-32001",
"CSAFPID-32002",
"CSAFPID-32003",
"CSAFPID-32004"
],
"known_affected": [
"CSAFPID-31001",
"CSAFPID-31002",
"CSAFPID-31003",
"CSAFPID-31004"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Phoenix Contact recommends operating network-capable devices in closed networks or protected with a suitable firewall. For detailed information on our recommendations for measures to protect network-capable devices, please refer to our application note: Measures to protect network-capable devices with Ethernet connection",
"group_ids": [
"CSAFGID-0001"
]
},
{
"category": "vendor_fix",
"details": "**Update to Firmware Release 2022.0.3 LTS or higher:**\n\n- AXC F 2152 (2404267) [Download](http://www.phoenixcontact.net/qr/2404267/firmware) \n- AXC F 1152 (1151412) [Download](http://www.phoenixcontact.net/qr/1151412/firmware) \n- AXC F 3152 (1069208) Not yet released\n\n**Update to PLCnext Engineer Release 2022.0.1 LTS or higher.**",
"group_ids": [
"CSAFGID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"environmentalScore": 5.3,
"environmentalSeverity": "MEDIUM",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"temporalScore": 5.3,
"temporalSeverity": "MEDIUM",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-31001",
"CSAFPID-31002",
"CSAFPID-31003",
"CSAFPID-31004"
]
}
],
"title": "CVE-2016-20012"
},
{
"cve": "CVE-2021-3580",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "description",
"text": "A flaw was found in the way nettle\u0027s RSA decryption functions handled specially crafted ciphertext. An attacker could use this flaw to provide a manipulated ciphertext leading to application crash and denial of service.",
"title": "Vulnerability Description"
}
],
"product_status": {
"fixed": [
"CSAFPID-32001",
"CSAFPID-32002",
"CSAFPID-32003",
"CSAFPID-32004"
],
"known_affected": [
"CSAFPID-31001",
"CSAFPID-31002",
"CSAFPID-31003",
"CSAFPID-31004"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Phoenix Contact recommends operating network-capable devices in closed networks or protected with a suitable firewall. For detailed information on our recommendations for measures to protect network-capable devices, please refer to our application note: Measures to protect network-capable devices with Ethernet connection",
"group_ids": [
"CSAFGID-0001"
]
},
{
"category": "vendor_fix",
"details": "**Update to Firmware Release 2022.0.3 LTS or higher:**\n\n- AXC F 2152 (2404267) [Download](http://www.phoenixcontact.net/qr/2404267/firmware) \n- AXC F 1152 (1151412) [Download](http://www.phoenixcontact.net/qr/1151412/firmware) \n- AXC F 3152 (1069208) Not yet released\n\n**Update to PLCnext Engineer Release 2022.0.1 LTS or higher.**",
"group_ids": [
"CSAFGID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"environmentalScore": 7.5,
"environmentalSeverity": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"temporalScore": 7.5,
"temporalSeverity": "HIGH",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-31001",
"CSAFPID-31002",
"CSAFPID-31003",
"CSAFPID-31004"
]
}
],
"title": "CVE-2021-3580"
},
{
"cve": "CVE-2021-20305",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"notes": [
{
"category": "description",
"text": "A flaw was found in Nettle in versions before 3.7.2, where several Nettle signature verification functions (GOST DSA, EDDSA \u0026 ECDSA) result in the Elliptic Curve Cryptography point (ECC) multiply function being called with out-of-range scalers, possibly resulting in incorrect results. This flaw allows an attacker to force an invalid signature, causing an assertion failure or possible validation. The highest threat to this vulnerability is to confidentiality, integrity, as well as system availability.",
"title": "Vulnerability Description"
}
],
"product_status": {
"fixed": [
"CSAFPID-32001",
"CSAFPID-32002",
"CSAFPID-32003",
"CSAFPID-32004"
],
"known_affected": [
"CSAFPID-31001",
"CSAFPID-31002",
"CSAFPID-31003",
"CSAFPID-31004"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Phoenix Contact recommends operating network-capable devices in closed networks or protected with a suitable firewall. For detailed information on our recommendations for measures to protect network-capable devices, please refer to our application note: Measures to protect network-capable devices with Ethernet connection",
"group_ids": [
"CSAFGID-0001"
]
},
{
"category": "vendor_fix",
"details": "**Update to Firmware Release 2022.0.3 LTS or higher:**\n\n- AXC F 2152 (2404267) [Download](http://www.phoenixcontact.net/qr/2404267/firmware) \n- AXC F 1152 (1151412) [Download](http://www.phoenixcontact.net/qr/1151412/firmware) \n- AXC F 3152 (1069208) Not yet released\n\n**Update to PLCnext Engineer Release 2022.0.1 LTS or higher.**",
"group_ids": [
"CSAFGID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.1,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"environmentalScore": 8.1,
"environmentalSeverity": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"temporalScore": 8.1,
"temporalSeverity": "HIGH",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-31001",
"CSAFPID-31002",
"CSAFPID-31003",
"CSAFPID-31004"
]
}
],
"title": "CVE-2021-20305"
},
{
"cve": "CVE-2021-40330",
"notes": [
{
"category": "description",
"text": "git_connect_git in connect.c in Git before 2.30.1 allows a repository path to contain a newline character, which may result in unexpected cross-protocol requests, as demonstrated by the git://localhost:1234/%0d%0a%0d%0aGET%20/%20HTTP/1.1 substring.",
"title": "Vulnerability Description"
}
],
"product_status": {
"fixed": [
"CSAFPID-32001",
"CSAFPID-32002",
"CSAFPID-32003",
"CSAFPID-32004"
],
"known_affected": [
"CSAFPID-31001",
"CSAFPID-31002",
"CSAFPID-31003",
"CSAFPID-31004"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Phoenix Contact recommends operating network-capable devices in closed networks or protected with a suitable firewall. For detailed information on our recommendations for measures to protect network-capable devices, please refer to our application note: Measures to protect network-capable devices with Ethernet connection",
"group_ids": [
"CSAFGID-0001"
]
},
{
"category": "vendor_fix",
"details": "**Update to Firmware Release 2022.0.3 LTS or higher:**\n\n- AXC F 2152 (2404267) [Download](http://www.phoenixcontact.net/qr/2404267/firmware) \n- AXC F 1152 (1151412) [Download](http://www.phoenixcontact.net/qr/1151412/firmware) \n- AXC F 3152 (1069208) Not yet released\n\n**Update to PLCnext Engineer Release 2022.0.1 LTS or higher.**",
"group_ids": [
"CSAFGID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"environmentalScore": 7.5,
"environmentalSeverity": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"temporalScore": 7.5,
"temporalSeverity": "HIGH",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-31001",
"CSAFPID-31002",
"CSAFPID-31003",
"CSAFPID-31004"
]
}
],
"title": "CVE-2021-40330"
},
{
"cve": "CVE-2021-35942",
"cwe": {
"id": "CWE-190",
"name": "Integer Overflow or Wraparound"
},
"notes": [
{
"category": "description",
"text": "The wordexp function in the GNU C Library (aka glibc) through 2.33 may crash or read arbitrary memory in parse_param (in posix/wordexp.c) when called with an untrusted, crafted pattern, potentially resulting in a denial of service or disclosure of information. This occurs because atoi was used but strtoul should have been used to ensure correct calculations.",
"title": "Vulnerability Description"
}
],
"product_status": {
"fixed": [
"CSAFPID-32001",
"CSAFPID-32002",
"CSAFPID-32003",
"CSAFPID-32004"
],
"known_affected": [
"CSAFPID-31001",
"CSAFPID-31002",
"CSAFPID-31003",
"CSAFPID-31004"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Phoenix Contact recommends operating network-capable devices in closed networks or protected with a suitable firewall. For detailed information on our recommendations for measures to protect network-capable devices, please refer to our application note: Measures to protect network-capable devices with Ethernet connection",
"group_ids": [
"CSAFGID-0001"
]
},
{
"category": "vendor_fix",
"details": "**Update to Firmware Release 2022.0.3 LTS or higher:**\n\n- AXC F 2152 (2404267) [Download](http://www.phoenixcontact.net/qr/2404267/firmware) \n- AXC F 1152 (1151412) [Download](http://www.phoenixcontact.net/qr/1151412/firmware) \n- AXC F 3152 (1069208) Not yet released\n\n**Update to PLCnext Engineer Release 2022.0.1 LTS or higher.**",
"group_ids": [
"CSAFGID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.1,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"environmentalScore": 9.1,
"environmentalSeverity": "CRITICAL",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"temporalScore": 9.1,
"temporalSeverity": "CRITICAL",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-31001",
"CSAFPID-31002",
"CSAFPID-31003",
"CSAFPID-31004"
]
}
],
"title": "CVE-2021-35942"
},
{
"cve": "CVE-2021-42386",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"notes": [
{
"category": "description",
"text": "A use-after-free in Busybox\u0027s awk applet leads to denial of service and possibly code execution when processing a crafted awk pattern in the nvalloc function",
"title": "Vulnerability Description"
}
],
"product_status": {
"fixed": [
"CSAFPID-32001",
"CSAFPID-32002",
"CSAFPID-32003",
"CSAFPID-32004"
],
"known_affected": [
"CSAFPID-31001",
"CSAFPID-31002",
"CSAFPID-31003",
"CSAFPID-31004"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Phoenix Contact recommends operating network-capable devices in closed networks or protected with a suitable firewall. For detailed information on our recommendations for measures to protect network-capable devices, please refer to our application note: Measures to protect network-capable devices with Ethernet connection",
"group_ids": [
"CSAFGID-0001"
]
},
{
"category": "vendor_fix",
"details": "**Update to Firmware Release 2022.0.3 LTS or higher:**\n\n- AXC F 2152 (2404267) [Download](http://www.phoenixcontact.net/qr/2404267/firmware) \n- AXC F 1152 (1151412) [Download](http://www.phoenixcontact.net/qr/1151412/firmware) \n- AXC F 3152 (1069208) Not yet released\n\n**Update to PLCnext Engineer Release 2022.0.1 LTS or higher.**",
"group_ids": [
"CSAFGID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.2,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"environmentalScore": 7.2,
"environmentalSeverity": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"temporalScore": 7.2,
"temporalSeverity": "HIGH",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-31001",
"CSAFPID-31002",
"CSAFPID-31003",
"CSAFPID-31004"
]
}
],
"title": "CVE-2021-42386"
},
{
"cve": "CVE-2020-6096",
"cwe": {
"id": "CWE-195",
"name": "Signed to Unsigned Conversion Error"
},
"notes": [
{
"category": "description",
"text": "An exploitable signed comparison vulnerability exists in the ARMv7 memcpy() implementation of GNU glibc 2.30.9000. Calling memcpy() (on ARMv7 targets that utilize the GNU glibc implementation) with a negative value for the \u0027num\u0027 parameter results in a signed comparison vulnerability. If an attacker underflows the \u0027num\u0027 parameter to memcpy(), this vulnerability could lead to undefined behavior such as writing to out-of-bounds memory and potentially remote code execution. Furthermore, this memcpy() implementation allows for program execution to continue in scenarios where a segmentation fault or crash should have occurred. The dangers occur in that subsequent execution and iterations of this code will be executed with this corrupted data.",
"title": "Vulnerability Description"
}
],
"product_status": {
"fixed": [
"CSAFPID-32001",
"CSAFPID-32002",
"CSAFPID-32003",
"CSAFPID-32004"
],
"known_affected": [
"CSAFPID-31001",
"CSAFPID-31002",
"CSAFPID-31003",
"CSAFPID-31004"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Phoenix Contact recommends operating network-capable devices in closed networks or protected with a suitable firewall. For detailed information on our recommendations for measures to protect network-capable devices, please refer to our application note: Measures to protect network-capable devices with Ethernet connection",
"group_ids": [
"CSAFGID-0001"
]
},
{
"category": "vendor_fix",
"details": "**Update to Firmware Release 2022.0.3 LTS or higher:**\n\n- AXC F 2152 (2404267) [Download](http://www.phoenixcontact.net/qr/2404267/firmware) \n- AXC F 1152 (1151412) [Download](http://www.phoenixcontact.net/qr/1151412/firmware) \n- AXC F 3152 (1069208) Not yet released\n\n**Update to PLCnext Engineer Release 2022.0.1 LTS or higher.**",
"group_ids": [
"CSAFGID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.1,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"environmentalScore": 8.1,
"environmentalSeverity": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"temporalScore": 8.1,
"temporalSeverity": "HIGH",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-31001",
"CSAFPID-31002",
"CSAFPID-31003",
"CSAFPID-31004"
]
}
],
"title": "CVE-2020-6096"
},
{
"cve": "CVE-2020-29562",
"cwe": {
"id": "CWE-617",
"name": "Reachable Assertion"
},
"notes": [
{
"category": "description",
"text": "The iconv function in the GNU C Library (aka glibc or libc6) 2.30 to 2.32, when converting UCS4 text containing an irreversible character, fails an assertion in the code path and aborts the program, potentially resulting in a denial of service.",
"title": "Vulnerability Description"
}
],
"product_status": {
"fixed": [
"CSAFPID-32001",
"CSAFPID-32002",
"CSAFPID-32003",
"CSAFPID-32004"
],
"known_affected": [
"CSAFPID-31001",
"CSAFPID-31002",
"CSAFPID-31003",
"CSAFPID-31004"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Phoenix Contact recommends operating network-capable devices in closed networks or protected with a suitable firewall. For detailed information on our recommendations for measures to protect network-capable devices, please refer to our application note: Measures to protect network-capable devices with Ethernet connection",
"group_ids": [
"CSAFGID-0001"
]
},
{
"category": "vendor_fix",
"details": "**Update to Firmware Release 2022.0.3 LTS or higher:**\n\n- AXC F 2152 (2404267) [Download](http://www.phoenixcontact.net/qr/2404267/firmware) \n- AXC F 1152 (1151412) [Download](http://www.phoenixcontact.net/qr/1151412/firmware) \n- AXC F 3152 (1069208) Not yet released\n\n**Update to PLCnext Engineer Release 2022.0.1 LTS or higher.**",
"group_ids": [
"CSAFGID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 4.8,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"environmentalScore": 4.8,
"environmentalSeverity": "MEDIUM",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"temporalScore": 4.8,
"temporalSeverity": "MEDIUM",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-31001",
"CSAFPID-31002",
"CSAFPID-31003",
"CSAFPID-31004"
]
}
],
"title": "CVE-2020-29562"
},
{
"cve": "CVE-2021-20231",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"notes": [
{
"category": "description",
"text": "A flaw was found in gnutls. A use after free issue in client sending key_share extension may lead to memory corruption and other consequences.",
"title": "Vulnerability Description"
}
],
"product_status": {
"fixed": [
"CSAFPID-32001",
"CSAFPID-32002",
"CSAFPID-32003",
"CSAFPID-32004"
],
"known_affected": [
"CSAFPID-31001",
"CSAFPID-31002",
"CSAFPID-31003",
"CSAFPID-31004"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Phoenix Contact recommends operating network-capable devices in closed networks or protected with a suitable firewall. For detailed information on our recommendations for measures to protect network-capable devices, please refer to our application note: Measures to protect network-capable devices with Ethernet connection",
"group_ids": [
"CSAFGID-0001"
]
},
{
"category": "vendor_fix",
"details": "**Update to Firmware Release 2022.0.3 LTS or higher:**\n\n- AXC F 2152 (2404267) [Download](http://www.phoenixcontact.net/qr/2404267/firmware) \n- AXC F 1152 (1151412) [Download](http://www.phoenixcontact.net/qr/1151412/firmware) \n- AXC F 3152 (1069208) Not yet released\n\n**Update to PLCnext Engineer Release 2022.0.1 LTS or higher.**",
"group_ids": [
"CSAFGID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"environmentalScore": 9.8,
"environmentalSeverity": "CRITICAL",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"temporalScore": 9.8,
"temporalSeverity": "CRITICAL",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-31001",
"CSAFPID-31002",
"CSAFPID-31003",
"CSAFPID-31004"
]
}
],
"title": "CVE-2021-20231"
},
{
"cve": "CVE-2021-20232",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"notes": [
{
"category": "description",
"text": "A flaw was found in gnutls. A use after free issue in client_send_params in lib/ext/pre_shared_key.c may lead to memory corruption and other potential consequences.",
"title": "Vulnerability Description"
}
],
"product_status": {
"fixed": [
"CSAFPID-32001",
"CSAFPID-32002",
"CSAFPID-32003",
"CSAFPID-32004"
],
"known_affected": [
"CSAFPID-31001",
"CSAFPID-31002",
"CSAFPID-31003",
"CSAFPID-31004"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Phoenix Contact recommends operating network-capable devices in closed networks or protected with a suitable firewall. For detailed information on our recommendations for measures to protect network-capable devices, please refer to our application note: Measures to protect network-capable devices with Ethernet connection",
"group_ids": [
"CSAFGID-0001"
]
},
{
"category": "vendor_fix",
"details": "**Update to Firmware Release 2022.0.3 LTS or higher:**\n\n- AXC F 2152 (2404267) [Download](http://www.phoenixcontact.net/qr/2404267/firmware) \n- AXC F 1152 (1151412) [Download](http://www.phoenixcontact.net/qr/1151412/firmware) \n- AXC F 3152 (1069208) Not yet released\n\n**Update to PLCnext Engineer Release 2022.0.1 LTS or higher.**",
"group_ids": [
"CSAFGID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"environmentalScore": 9.8,
"environmentalSeverity": "CRITICAL",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"temporalScore": 9.8,
"temporalSeverity": "CRITICAL",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-31001",
"CSAFPID-31002",
"CSAFPID-31003",
"CSAFPID-31004"
]
}
],
"title": "CVE-2021-20232"
},
{
"cve": "CVE-2020-24659",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"notes": [
{
"category": "description",
"text": "An issue was discovered in GnuTLS before 3.6.15. A server can trigger a NULL pointer dereference in a TLS 1.3 client if a no_renegotiation alert is sent with unexpected timing, and then an invalid second handshake occurs. The crash happens in the application\u0027s error handling path, where the gnutls_deinit function is called after detecting a handshake failure.",
"title": "Vulnerability Description"
}
],
"product_status": {
"fixed": [
"CSAFPID-32001",
"CSAFPID-32002",
"CSAFPID-32003",
"CSAFPID-32004"
],
"known_affected": [
"CSAFPID-31001",
"CSAFPID-31002",
"CSAFPID-31003",
"CSAFPID-31004"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Phoenix Contact recommends operating network-capable devices in closed networks or protected with a suitable firewall. For detailed information on our recommendations for measures to protect network-capable devices, please refer to our application note: Measures to protect network-capable devices with Ethernet connection",
"group_ids": [
"CSAFGID-0001"
]
},
{
"category": "vendor_fix",
"details": "**Update to Firmware Release 2022.0.3 LTS or higher:**\n\n- AXC F 2152 (2404267) [Download](http://www.phoenixcontact.net/qr/2404267/firmware) \n- AXC F 1152 (1151412) [Download](http://www.phoenixcontact.net/qr/1151412/firmware) \n- AXC F 3152 (1069208) Not yet released\n\n**Update to PLCnext Engineer Release 2022.0.1 LTS or higher.**",
"group_ids": [
"CSAFGID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"environmentalScore": 7.5,
"environmentalSeverity": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"temporalScore": 7.5,
"temporalSeverity": "HIGH",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-31001",
"CSAFPID-31002",
"CSAFPID-31003",
"CSAFPID-31004"
]
}
],
"title": "CVE-2020-24659"
},
{
"cve": "CVE-2019-17498",
"cwe": {
"id": "CWE-190",
"name": "Integer Overflow or Wraparound"
},
"notes": [
{
"category": "description",
"text": "In libssh2 v1.9.0 and earlier versions, the SSH_MSG_DISCONNECT logic in packet.c has an integer overflow in a bounds check, enabling an attacker to specify an arbitrary (out-of-bounds) offset for a subsequent memory read. A crafted SSH server may be able to disclose sensitive information or cause a denial of service condition on the client system when a user connects to the server.",
"title": "Vulnerability Description"
}
],
"product_status": {
"fixed": [
"CSAFPID-32001",
"CSAFPID-32002",
"CSAFPID-32003",
"CSAFPID-32004"
],
"known_affected": [
"CSAFPID-31001",
"CSAFPID-31002",
"CSAFPID-31003",
"CSAFPID-31004"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Phoenix Contact recommends operating network-capable devices in closed networks or protected with a suitable firewall. For detailed information on our recommendations for measures to protect network-capable devices, please refer to our application note: Measures to protect network-capable devices with Ethernet connection",
"group_ids": [
"CSAFGID-0001"
]
},
{
"category": "vendor_fix",
"details": "**Update to Firmware Release 2022.0.3 LTS or higher:**\n\n- AXC F 2152 (2404267) [Download](http://www.phoenixcontact.net/qr/2404267/firmware) \n- AXC F 1152 (1151412) [Download](http://www.phoenixcontact.net/qr/1151412/firmware) \n- AXC F 3152 (1069208) Not yet released\n\n**Update to PLCnext Engineer Release 2022.0.1 LTS or higher.**",
"group_ids": [
"CSAFGID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.1,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"environmentalScore": 8.1,
"environmentalSeverity": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"temporalScore": 8.1,
"temporalSeverity": "HIGH",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-31001",
"CSAFPID-31002",
"CSAFPID-31003",
"CSAFPID-31004"
]
}
],
"title": "CVE-2019-17498"
},
{
"cve": "CVE-2021-3517",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"notes": [
{
"category": "description",
"text": "There is a flaw in the xml entity encoding functionality of libxml2 in versions before 2.9.11. An attacker who is able to supply a crafted file to be processed by an application linked with the affected functionality of libxml2 could trigger an out-of-bounds read. The most likely impact of this flaw is to application availability, with some potential impact to confidentiality and integrity if an attacker is able to use memory information to further exploit the application.",
"title": "Vulnerability Description"
}
],
"product_status": {
"fixed": [
"CSAFPID-32001",
"CSAFPID-32002",
"CSAFPID-32003",
"CSAFPID-32004"
],
"known_affected": [
"CSAFPID-31001",
"CSAFPID-31002",
"CSAFPID-31003",
"CSAFPID-31004"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Phoenix Contact recommends operating network-capable devices in closed networks or protected with a suitable firewall. For detailed information on our recommendations for measures to protect network-capable devices, please refer to our application note: Measures to protect network-capable devices with Ethernet connection",
"group_ids": [
"CSAFGID-0001"
]
},
{
"category": "vendor_fix",
"details": "**Update to Firmware Release 2022.0.3 LTS or higher:**\n\n- AXC F 2152 (2404267) [Download](http://www.phoenixcontact.net/qr/2404267/firmware) \n- AXC F 1152 (1151412) [Download](http://www.phoenixcontact.net/qr/1151412/firmware) \n- AXC F 3152 (1069208) Not yet released\n\n**Update to PLCnext Engineer Release 2022.0.1 LTS or higher.**",
"group_ids": [
"CSAFGID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.6,
"baseSeverity": "HIGH",
"confidentialityImpact": "LOW",
"environmentalScore": 8.6,
"environmentalSeverity": "HIGH",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"temporalScore": 8.6,
"temporalSeverity": "HIGH",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-31001",
"CSAFPID-31002",
"CSAFPID-31003",
"CSAFPID-31004"
]
}
],
"title": "CVE-2021-3517"
},
{
"cve": "CVE-2021-3537",
"cwe": {
"id": "CWE-476",
"name": "NULL Pointer Dereference"
},
"notes": [
{
"category": "description",
"text": "A vulnerability found in libxml2 in versions before 2.9.11 shows that it did not propagate errors while parsing XML mixed content, causing a NULL dereference. If an untrusted XML document was parsed in recovery mode and post-validated, the flaw could be used to crash the application. The highest threat from this vulnerability is to system availability.",
"title": "Vulnerability Description"
}
],
"product_status": {
"fixed": [
"CSAFPID-32001",
"CSAFPID-32002",
"CSAFPID-32003",
"CSAFPID-32004"
],
"known_affected": [
"CSAFPID-31001",
"CSAFPID-31002",
"CSAFPID-31003",
"CSAFPID-31004"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Phoenix Contact recommends operating network-capable devices in closed networks or protected with a suitable firewall. For detailed information on our recommendations for measures to protect network-capable devices, please refer to our application note: Measures to protect network-capable devices with Ethernet connection",
"group_ids": [
"CSAFGID-0001"
]
},
{
"category": "vendor_fix",
"details": "**Update to Firmware Release 2022.0.3 LTS or higher:**\n\n- AXC F 2152 (2404267) [Download](http://www.phoenixcontact.net/qr/2404267/firmware) \n- AXC F 1152 (1151412) [Download](http://www.phoenixcontact.net/qr/1151412/firmware) \n- AXC F 3152 (1069208) Not yet released\n\n**Update to PLCnext Engineer Release 2022.0.1 LTS or higher.**",
"group_ids": [
"CSAFGID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"environmentalScore": 5.9,
"environmentalSeverity": "MEDIUM",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"temporalScore": 5.9,
"temporalSeverity": "MEDIUM",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-31001",
"CSAFPID-31002",
"CSAFPID-31003",
"CSAFPID-31004"
]
}
],
"title": "CVE-2021-3537"
},
{
"cve": "CVE-2020-10543",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"notes": [
{
"category": "description",
"text": "Perl before 5.30.3 on 32-bit platforms allows a heap-based buffer overflow because nested regular expression quantifiers have an integer overflow.",
"title": "Vulnerability Description"
}
],
"product_status": {
"fixed": [
"CSAFPID-32001",
"CSAFPID-32002",
"CSAFPID-32003",
"CSAFPID-32004"
],
"known_affected": [
"CSAFPID-31001",
"CSAFPID-31002",
"CSAFPID-31003",
"CSAFPID-31004"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Phoenix Contact recommends operating network-capable devices in closed networks or protected with a suitable firewall. For detailed information on our recommendations for measures to protect network-capable devices, please refer to our application note: Measures to protect network-capable devices with Ethernet connection",
"group_ids": [
"CSAFGID-0001"
]
},
{
"category": "vendor_fix",
"details": "**Update to Firmware Release 2022.0.3 LTS or higher:**\n\n- AXC F 2152 (2404267) [Download](http://www.phoenixcontact.net/qr/2404267/firmware) \n- AXC F 1152 (1151412) [Download](http://www.phoenixcontact.net/qr/1151412/firmware) \n- AXC F 3152 (1069208) Not yet released\n\n**Update to PLCnext Engineer Release 2022.0.1 LTS or higher.**",
"group_ids": [
"CSAFGID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.2,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"environmentalScore": 8.2,
"environmentalSeverity": "HIGH",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"temporalScore": 8.2,
"temporalSeverity": "HIGH",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-31001",
"CSAFPID-31002",
"CSAFPID-31003",
"CSAFPID-31004"
]
}
],
"title": "CVE-2020-10543"
},
{
"cve": "CVE-2020-12723",
"cwe": {
"id": "CWE-120",
"name": "Buffer Copy without Checking Size of Input (\u0027Classic Buffer Overflow\u0027)"
},
"notes": [
{
"category": "description",
"text": "regcomp.c in Perl before 5.30.3 allows a buffer overflow via a crafted regular expression because of recursive S_study_chunk calls.",
"title": "Vulnerability Description"
}
],
"product_status": {
"fixed": [
"CSAFPID-32001",
"CSAFPID-32002",
"CSAFPID-32003",
"CSAFPID-32004"
],
"known_affected": [
"CSAFPID-31001",
"CSAFPID-31002",
"CSAFPID-31003",
"CSAFPID-31004"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Phoenix Contact recommends operating network-capable devices in closed networks or protected with a suitable firewall. For detailed information on our recommendations for measures to protect network-capable devices, please refer to our application note: Measures to protect network-capable devices with Ethernet connection",
"group_ids": [
"CSAFGID-0001"
]
},
{
"category": "vendor_fix",
"details": "**Update to Firmware Release 2022.0.3 LTS or higher:**\n\n- AXC F 2152 (2404267) [Download](http://www.phoenixcontact.net/qr/2404267/firmware) \n- AXC F 1152 (1151412) [Download](http://www.phoenixcontact.net/qr/1151412/firmware) \n- AXC F 3152 (1069208) Not yet released\n\n**Update to PLCnext Engineer Release 2022.0.1 LTS or higher.**",
"group_ids": [
"CSAFGID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"environmentalScore": 7.5,
"environmentalSeverity": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"temporalScore": 7.5,
"temporalSeverity": "HIGH",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-31001",
"CSAFPID-31002",
"CSAFPID-31003",
"CSAFPID-31004"
]
}
],
"title": "CVE-2020-12723"
},
{
"cve": "CVE-2021-20193",
"cwe": {
"id": "CWE-125",
"name": "Out-of-bounds Read"
},
"notes": [
{
"category": "description",
"text": "A flaw was found in the src/list.c of tar 1.33 and earlier. This flaw allows an attacker who can submit a crafted input file to tar to cause uncontrolled consumption of memory. The highest threat from this vulnerability is to system availability.",
"title": "Vulnerability Description"
}
],
"product_status": {
"fixed": [
"CSAFPID-32001",
"CSAFPID-32002",
"CSAFPID-32003",
"CSAFPID-32004"
],
"known_affected": [
"CSAFPID-31001",
"CSAFPID-31002",
"CSAFPID-31003",
"CSAFPID-31004"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Phoenix Contact recommends operating network-capable devices in closed networks or protected with a suitable firewall. For detailed information on our recommendations for measures to protect network-capable devices, please refer to our application note: Measures to protect network-capable devices with Ethernet connection",
"group_ids": [
"CSAFGID-0001"
]
},
{
"category": "vendor_fix",
"details": "**Update to Firmware Release 2022.0.3 LTS or higher:**\n\n- AXC F 2152 (2404267) [Download](http://www.phoenixcontact.net/qr/2404267/firmware) \n- AXC F 1152 (1151412) [Download](http://www.phoenixcontact.net/qr/1151412/firmware) \n- AXC F 3152 (1069208) Not yet released\n\n**Update to PLCnext Engineer Release 2022.0.1 LTS or higher.**",
"group_ids": [
"CSAFGID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "LOW",
"baseScore": 3.3,
"baseSeverity": "LOW",
"confidentialityImpact": "NONE",
"environmentalScore": 3.3,
"environmentalSeverity": "LOW",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"temporalScore": 3.3,
"temporalSeverity": "LOW",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"CSAFPID-31001",
"CSAFPID-31002",
"CSAFPID-31003",
"CSAFPID-31004"
]
}
],
"title": "CVE-2021-20193"
},
{
"cve": "CVE-2019-20892",
"cwe": {
"id": "CWE-415",
"name": "Double Free"
},
"notes": [
{
"category": "description",
"text": "net-snmp before 5.8.1.pre1 has a double free in usm_free_usmStateReference in snmplib/snmpusm.c via an SNMPv3 GetBulk request. NOTE: this affects net-snmp packages shipped to end users by multiple Linux distributions, but might not affect an upstream release.",
"title": "Vulnerability Description"
}
],
"product_status": {
"fixed": [
"CSAFPID-32001",
"CSAFPID-32002",
"CSAFPID-32003",
"CSAFPID-32004"
],
"known_affected": [
"CSAFPID-31001",
"CSAFPID-31002",
"CSAFPID-31003",
"CSAFPID-31004"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Phoenix Contact recommends operating network-capable devices in closed networks or protected with a suitable firewall. For detailed information on our recommendations for measures to protect network-capable devices, please refer to our application note: Measures to protect network-capable devices with Ethernet connection",
"group_ids": [
"CSAFGID-0001"
]
},
{
"category": "vendor_fix",
"details": "**Update to Firmware Release 2022.0.3 LTS or higher:**\n\n- AXC F 2152 (2404267) [Download](http://www.phoenixcontact.net/qr/2404267/firmware) \n- AXC F 1152 (1151412) [Download](http://www.phoenixcontact.net/qr/1151412/firmware) \n- AXC F 3152 (1069208) Not yet released\n\n**Update to PLCnext Engineer Release 2022.0.1 LTS or higher.**",
"group_ids": [
"CSAFGID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"environmentalScore": 6.5,
"environmentalSeverity": "MEDIUM",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"temporalScore": 6.5,
"temporalSeverity": "MEDIUM",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-31001",
"CSAFPID-31002",
"CSAFPID-31003",
"CSAFPID-31004"
]
}
],
"title": "CVE-2019-20892"
},
{
"cve": "CVE-2021-43618",
"cwe": {
"id": "CWE-190",
"name": "Integer Overflow or Wraparound"
},
"notes": [
{
"category": "description",
"text": "GNU Multiple Precision Arithmetic Library (GMP) through 6.2.1 has an mpz/inp_raw.c integer overflow and resultant buffer overflow via crafted input, leading to a segmentation fault on 32-bit platforms.",
"title": "Vulnerability Description"
}
],
"product_status": {
"fixed": [
"CSAFPID-32001",
"CSAFPID-32002",
"CSAFPID-32003",
"CSAFPID-32004"
],
"known_affected": [
"CSAFPID-31001",
"CSAFPID-31002",
"CSAFPID-31003",
"CSAFPID-31004"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Phoenix Contact recommends operating network-capable devices in closed networks or protected with a suitable firewall. For detailed information on our recommendations for measures to protect network-capable devices, please refer to our application note: Measures to protect network-capable devices with Ethernet connection",
"group_ids": [
"CSAFGID-0001"
]
},
{
"category": "vendor_fix",
"details": "**Update to Firmware Release 2022.0.3 LTS or higher:**\n\n- AXC F 2152 (2404267) [Download](http://www.phoenixcontact.net/qr/2404267/firmware) \n- AXC F 1152 (1151412) [Download](http://www.phoenixcontact.net/qr/1151412/firmware) \n- AXC F 3152 (1069208) Not yet released\n\n**Update to PLCnext Engineer Release 2022.0.1 LTS or higher.**",
"group_ids": [
"CSAFGID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"environmentalScore": 7.5,
"environmentalSeverity": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"temporalScore": 7.5,
"temporalSeverity": "HIGH",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-31001",
"CSAFPID-31002",
"CSAFPID-31003",
"CSAFPID-31004"
]
}
],
"title": "CVE-2021-43618"
},
{
"cve": "CVE-2019-20907",
"cwe": {
"id": "CWE-835",
"name": "Loop with Unreachable Exit Condition (\u0027Infinite Loop\u0027)"
},
"notes": [
{
"category": "description",
"text": "In Lib/tarfile.py in Python through 3.8.3, an attacker is able to craft a TAR archive leading to an infinite loop when opened by tarfile.open, because _proc_pax lacks header validation.",
"title": "Vulnerability Description"
}
],
"product_status": {
"fixed": [
"CSAFPID-32001",
"CSAFPID-32002",
"CSAFPID-32003",
"CSAFPID-32004"
],
"known_affected": [
"CSAFPID-31001",
"CSAFPID-31002",
"CSAFPID-31003",
"CSAFPID-31004"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Phoenix Contact recommends operating network-capable devices in closed networks or protected with a suitable firewall. For detailed information on our recommendations for measures to protect network-capable devices, please refer to our application note: Measures to protect network-capable devices with Ethernet connection",
"group_ids": [
"CSAFGID-0001"
]
},
{
"category": "vendor_fix",
"details": "**Update to Firmware Release 2022.0.3 LTS or higher:**\n\n- AXC F 2152 (2404267) [Download](http://www.phoenixcontact.net/qr/2404267/firmware) \n- AXC F 1152 (1151412) [Download](http://www.phoenixcontact.net/qr/1151412/firmware) \n- AXC F 3152 (1069208) Not yet released\n\n**Update to PLCnext Engineer Release 2022.0.1 LTS or higher.**",
"group_ids": [
"CSAFGID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"environmentalScore": 7.5,
"environmentalSeverity": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"temporalScore": 7.5,
"temporalSeverity": "HIGH",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-31001",
"CSAFPID-31002",
"CSAFPID-31003",
"CSAFPID-31004"
]
}
],
"title": "CVE-2019-20907"
},
{
"cve": "CVE-2021-22946",
"cwe": {
"id": "CWE-319",
"name": "Cleartext Transmission of Sensitive Information"
},
"notes": [
{
"category": "description",
"text": "A user can tell curl \u003e= 7.20.0 and \u003c= 7.78.0 to require a successful upgrade to TLS when speaking to an IMAP, POP3 or FTP server (\u0027--ssl-reqd\u0027 on the command line or\u0027CURLOPT_USE_SSL\u0027 set to \u0027CURLUSESSL_CONTROL\u0027 or \u0027CURLUSESSL_ALL\u0027 withlibcurl). This requirement could be bypassed if the server would return a properly crafted but perfectly legitimate response.This flaw would then make curl silently continue its operations **withoutTLS** contrary to the instructions and expectations, exposing possibly sensitive data in clear text over the network.",
"title": "Vulnerability Description"
}
],
"product_status": {
"fixed": [
"CSAFPID-32001",
"CSAFPID-32002",
"CSAFPID-32003",
"CSAFPID-32004"
],
"known_affected": [
"CSAFPID-31001",
"CSAFPID-31002",
"CSAFPID-31003",
"CSAFPID-31004"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Phoenix Contact recommends operating network-capable devices in closed networks or protected with a suitable firewall. For detailed information on our recommendations for measures to protect network-capable devices, please refer to our application note: Measures to protect network-capable devices with Ethernet connection",
"group_ids": [
"CSAFGID-0001"
]
},
{
"category": "vendor_fix",
"details": "**Update to Firmware Release 2022.0.3 LTS or higher:**\n\n- AXC F 2152 (2404267) [Download](http://www.phoenixcontact.net/qr/2404267/firmware) \n- AXC F 1152 (1151412) [Download](http://www.phoenixcontact.net/qr/1151412/firmware) \n- AXC F 3152 (1069208) Not yet released\n\n**Update to PLCnext Engineer Release 2022.0.1 LTS or higher.**",
"group_ids": [
"CSAFGID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"environmentalScore": 7.5,
"environmentalSeverity": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"temporalScore": 7.5,
"temporalSeverity": "HIGH",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-31001",
"CSAFPID-31002",
"CSAFPID-31003",
"CSAFPID-31004"
]
}
],
"title": "CVE-2021-22946"
},
{
"cve": "CVE-2020-8169",
"cwe": {
"id": "CWE-200",
"name": "Exposure of Sensitive Information to an Unauthorized Actor"
},
"notes": [
{
"category": "description",
"text": "curl 7.62.0 through 7.70.0 is vulnerable to an information disclosure vulnerability that can lead to a partial password being leaked over the network and to the DNS server(s).",
"title": "Vulnerability Description"
}
],
"product_status": {
"fixed": [
"CSAFPID-32001",
"CSAFPID-32002",
"CSAFPID-32003",
"CSAFPID-32004"
],
"known_affected": [
"CSAFPID-31001",
"CSAFPID-31002",
"CSAFPID-31003",
"CSAFPID-31004"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Phoenix Contact recommends operating network-capable devices in closed networks or protected with a suitable firewall. For detailed information on our recommendations for measures to protect network-capable devices, please refer to our application note: Measures to protect network-capable devices with Ethernet connection",
"group_ids": [
"CSAFGID-0001"
]
},
{
"category": "vendor_fix",
"details": "**Update to Firmware Release 2022.0.3 LTS or higher:**\n\n- AXC F 2152 (2404267) [Download](http://www.phoenixcontact.net/qr/2404267/firmware) \n- AXC F 1152 (1151412) [Download](http://www.phoenixcontact.net/qr/1151412/firmware) \n- AXC F 3152 (1069208) Not yet released\n\n**Update to PLCnext Engineer Release 2022.0.1 LTS or higher.**",
"group_ids": [
"CSAFGID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"environmentalScore": 7.5,
"environmentalSeverity": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"temporalScore": 7.5,
"temporalSeverity": "HIGH",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-31001",
"CSAFPID-31002",
"CSAFPID-31003",
"CSAFPID-31004"
]
}
],
"title": "CVE-2020-8169"
},
{
"cve": "CVE-2021-22926",
"cwe": {
"id": "CWE-295",
"name": "Improper Certificate Validation"
},
"notes": [
{
"category": "description",
"text": "libcurl-using applications can ask for a specific client certificate to be used in a transfer. This is done with the \u0027CURLOPT_SSLCERT\u0027 option (\u0027--cert\u0027 with the command line tool).When libcurl is built to use the macOS native TLS library Secure Transport, an application can ask for the client certificate by name or with a file name - using the same option. If the name exists as a file, it will be used instead of by name.If the appliction runs with a current working directory that is writable by other users (like \u0027/tmp\u0027), a malicious user can create a file name with the same name as the app wants to use by name, and thereby trick the application to use the file based cert instead of the one referred to by name making libcurl send the wrong client certificate in the TLS connection handshake.",
"title": "Vulnerability Description"
}
],
"product_status": {
"fixed": [
"CSAFPID-32001",
"CSAFPID-32002",
"CSAFPID-32003",
"CSAFPID-32004"
],
"known_affected": [
"CSAFPID-31001",
"CSAFPID-31002",
"CSAFPID-31003",
"CSAFPID-31004"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Phoenix Contact recommends operating network-capable devices in closed networks or protected with a suitable firewall. For detailed information on our recommendations for measures to protect network-capable devices, please refer to our application note: Measures to protect network-capable devices with Ethernet connection",
"group_ids": [
"CSAFGID-0001"
]
},
{
"category": "vendor_fix",
"details": "**Update to Firmware Release 2022.0.3 LTS or higher:**\n\n- AXC F 2152 (2404267) [Download](http://www.phoenixcontact.net/qr/2404267/firmware) \n- AXC F 1152 (1151412) [Download](http://www.phoenixcontact.net/qr/1151412/firmware) \n- AXC F 3152 (1069208) Not yet released\n\n**Update to PLCnext Engineer Release 2022.0.1 LTS or higher.**",
"group_ids": [
"CSAFGID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"environmentalScore": 7.5,
"environmentalSeverity": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"temporalScore": 7.5,
"temporalSeverity": "HIGH",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-31001",
"CSAFPID-31002",
"CSAFPID-31003",
"CSAFPID-31004"
]
}
],
"title": "CVE-2021-22926"
},
{
"cve": "CVE-2021-23017",
"cwe": {
"id": "CWE-193",
"name": "Off-by-one Error"
},
"notes": [
{
"category": "description",
"text": "A security issue in nginx resolver was identified, which might allow an attacker who is able to forge UDP packets from the DNS server to cause 1-byte memory overwrite, resulting in worker process crash or potential other impact.",
"title": "Vulnerability Description"
}
],
"product_status": {
"fixed": [
"CSAFPID-32001",
"CSAFPID-32002",
"CSAFPID-32003",
"CSAFPID-32004"
],
"known_affected": [
"CSAFPID-31001",
"CSAFPID-31002",
"CSAFPID-31003",
"CSAFPID-31004"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Phoenix Contact recommends operating network-capable devices in closed networks or protected with a suitable firewall. For detailed information on our recommendations for measures to protect network-capable devices, please refer to our application note: Measures to protect network-capable devices with Ethernet connection",
"group_ids": [
"CSAFGID-0001"
]
},
{
"category": "vendor_fix",
"details": "**Update to Firmware Release 2022.0.3 LTS or higher:**\n\n- AXC F 2152 (2404267) [Download](http://www.phoenixcontact.net/qr/2404267/firmware) \n- AXC F 1152 (1151412) [Download](http://www.phoenixcontact.net/qr/1151412/firmware) \n- AXC F 3152 (1069208) Not yet released\n\n**Update to PLCnext Engineer Release 2022.0.1 LTS or higher.**",
"group_ids": [
"CSAFGID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "LOW",
"baseScore": 7.7,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"environmentalScore": 7.7,
"environmentalSeverity": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"temporalScore": 7.7,
"temporalSeverity": "HIGH",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:L",
"version": "3.1"
},
"products": [
"CSAFPID-31001",
"CSAFPID-31002",
"CSAFPID-31003",
"CSAFPID-31004"
]
}
],
"title": "CVE-2021-23017"
},
{
"cve": "CVE-2020-8177",
"cwe": {
"id": "CWE-74",
"name": "Improper Neutralization of Special Elements in Output Used by a Downstream Component (\u0027Injection\u0027)"
},
"notes": [
{
"category": "description",
"text": "curl 7.20.0 through 7.70.0 is vulnerable to improper restriction of names for files and other resources that can lead too overwriting a local file when the -J flag is used.",
"title": "Vulnerability Description"
}
],
"product_status": {
"fixed": [
"CSAFPID-32001",
"CSAFPID-32002",
"CSAFPID-32003",
"CSAFPID-32004"
],
"known_affected": [
"CSAFPID-31001",
"CSAFPID-31002",
"CSAFPID-31003",
"CSAFPID-31004"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Phoenix Contact recommends operating network-capable devices in closed networks or protected with a suitable firewall. For detailed information on our recommendations for measures to protect network-capable devices, please refer to our application note: Measures to protect network-capable devices with Ethernet connection",
"group_ids": [
"CSAFGID-0001"
]
},
{
"category": "vendor_fix",
"details": "**Update to Firmware Release 2022.0.3 LTS or higher:**\n\n- AXC F 2152 (2404267) [Download](http://www.phoenixcontact.net/qr/2404267/firmware) \n- AXC F 1152 (1151412) [Download](http://www.phoenixcontact.net/qr/1151412/firmware) \n- AXC F 3152 (1069208) Not yet released\n\n**Update to PLCnext Engineer Release 2022.0.1 LTS or higher.**",
"group_ids": [
"CSAFGID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"environmentalScore": 7.8,
"environmentalSeverity": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"temporalScore": 7.8,
"temporalSeverity": "HIGH",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-31001",
"CSAFPID-31002",
"CSAFPID-31003",
"CSAFPID-31004"
]
}
],
"title": "CVE-2020-8177"
},
{
"cve": "CVE-2018-1000500",
"cwe": {
"id": "CWE-295",
"name": "Improper Certificate Validation"
},
"notes": [
{
"category": "description",
"text": "Busybox contains a Missing SSL certificate validation vulnerability in The \"busybox wget\" applet that can result in arbitrary code execution. This attack appear to be exploitable via Simply download any file over HTTPS using \"busybox wget https://compromised-domain.com/important-file\".",
"title": "Vulnerability Description"
}
],
"product_status": {
"fixed": [
"CSAFPID-32001",
"CSAFPID-32002",
"CSAFPID-32003",
"CSAFPID-32004"
],
"known_affected": [
"CSAFPID-31001",
"CSAFPID-31002",
"CSAFPID-31003",
"CSAFPID-31004"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Phoenix Contact recommends operating network-capable devices in closed networks or protected with a suitable firewall. For detailed information on our recommendations for measures to protect network-capable devices, please refer to our application note: Measures to protect network-capable devices with Ethernet connection",
"group_ids": [
"CSAFGID-0001"
]
},
{
"category": "vendor_fix",
"details": "**Update to Firmware Release 2022.0.3 LTS or higher:**\n\n- AXC F 2152 (2404267) [Download](http://www.phoenixcontact.net/qr/2404267/firmware) \n- AXC F 1152 (1151412) [Download](http://www.phoenixcontact.net/qr/1151412/firmware) \n- AXC F 3152 (1069208) Not yet released\n\n**Update to PLCnext Engineer Release 2022.0.1 LTS or higher.**",
"group_ids": [
"CSAFGID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.1,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"environmentalScore": 8.1,
"environmentalSeverity": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"temporalScore": 8.1,
"temporalSeverity": "HIGH",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-31001",
"CSAFPID-31002",
"CSAFPID-31003",
"CSAFPID-31004"
]
}
],
"title": "CVE-2018-1000500"
},
{
"cve": "CVE-2021-22922",
"cwe": {
"id": "CWE-755",
"name": "Improper Handling of Exceptional Conditions"
},
"notes": [
{
"category": "description",
"text": "When curl is instructed to download content using the metalink feature, thecontents is verified against a hash provided in the metalink XML file.The metalink XML file points out to the client how to get the same contentfrom a set of different URLs, potentially hosted by different servers and theclient can then download the file from one or several of them. In a serial orparallel manner.If one of the servers hosting the contents has been breached and the contentsof the specific file on that server is replaced with a modified payload, curlshould detect this when the hash of the file mismatches after a completeddownload. It should remove the contents and instead try getting the contentsfrom another URL. This is not done, and instead such a hash mismatch is onlymentioned in text and the potentially malicious content is kept in the file ondisk.",
"title": "Vulnerability Description"
}
],
"product_status": {
"fixed": [
"CSAFPID-32001",
"CSAFPID-32002",
"CSAFPID-32003",
"CSAFPID-32004"
],
"known_affected": [
"CSAFPID-31001",
"CSAFPID-31002",
"CSAFPID-31003",
"CSAFPID-31004"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Phoenix Contact recommends operating network-capable devices in closed networks or protected with a suitable firewall. For detailed information on our recommendations for measures to protect network-capable devices, please refer to our application note: Measures to protect network-capable devices with Ethernet connection",
"group_ids": [
"CSAFGID-0001"
]
},
{
"category": "vendor_fix",
"details": "**Update to Firmware Release 2022.0.3 LTS or higher:**\n\n- AXC F 2152 (2404267) [Download](http://www.phoenixcontact.net/qr/2404267/firmware) \n- AXC F 1152 (1151412) [Download](http://www.phoenixcontact.net/qr/1151412/firmware) \n- AXC F 3152 (1069208) Not yet released\n\n**Update to PLCnext Engineer Release 2022.0.1 LTS or higher.**",
"group_ids": [
"CSAFGID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"environmentalScore": 6.5,
"environmentalSeverity": "MEDIUM",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"temporalScore": 6.5,
"temporalSeverity": "MEDIUM",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-31001",
"CSAFPID-31002",
"CSAFPID-31003",
"CSAFPID-31004"
]
}
],
"title": "CVE-2021-22922"
},
{
"cve": "CVE-2021-22947",
"cwe": {
"id": "CWE-345",
"name": "Insufficient Verification of Data Authenticity"
},
"notes": [
{
"category": "description",
"text": "When curl \u003e= 7.20.0 and \u003c= 7.78.0 connects to an IMAP or POP3 server to retrieve data using STARTTLS to upgrade to TLS security, the server can respond and send back multiple responses at once that curl caches. curl would then upgrade to TLS but not flush the in-queue of cached responses but instead continue using and trustingthe responses it got *before* the TLS handshake as if they were authenticated.Using this flaw, it allows a Man-In-The-Middle attacker to first inject the fake responses, then pass-through the TLS traffic from the legitimate server and trick curl into sending data back to the user thinking the attacker\u0027s injected data comes from the TLS-protected server.",
"title": "Vulnerability Description"
}
],
"product_status": {
"fixed": [
"CSAFPID-32001",
"CSAFPID-32002",
"CSAFPID-32003",
"CSAFPID-32004"
],
"known_affected": [
"CSAFPID-31001",
"CSAFPID-31002",
"CSAFPID-31003",
"CSAFPID-31004"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Phoenix Contact recommends operating network-capable devices in closed networks or protected with a suitable firewall. For detailed information on our recommendations for measures to protect network-capable devices, please refer to our application note: Measures to protect network-capable devices with Ethernet connection",
"group_ids": [
"CSAFGID-0001"
]
},
{
"category": "vendor_fix",
"details": "**Update to Firmware Release 2022.0.3 LTS or higher:**\n\n- AXC F 2152 (2404267) [Download](http://www.phoenixcontact.net/qr/2404267/firmware) \n- AXC F 1152 (1151412) [Download](http://www.phoenixcontact.net/qr/1151412/firmware) \n- AXC F 3152 (1069208) Not yet released\n\n**Update to PLCnext Engineer Release 2022.0.1 LTS or higher.**",
"group_ids": [
"CSAFGID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"environmentalScore": 5.9,
"environmentalSeverity": "MEDIUM",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"temporalScore": 5.9,
"temporalSeverity": "MEDIUM",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-31001",
"CSAFPID-31002",
"CSAFPID-31003",
"CSAFPID-31004"
]
}
],
"title": "CVE-2021-22947"
},
{
"cve": "CVE-2021-22897",
"cwe": {
"id": "CWE-668",
"name": "Exposure of Resource to Wrong Sphere"
},
"notes": [
{
"category": "description",
"text": "curl 7.61.0 through 7.76.1 suffers from exposure of data element to wrong session due to a mistake in the code for CURLOPT_SSL_CIPHER_LIST when libcurl is built to use the Schannel TLS library. The selected cipher set was stored in a single \"static\" variable in the library, which has the surprising side-effect that if an application sets up multiple concurrent transfers, the last one that sets the ciphers will accidentally control the set used by all transfers. In a worst-case scenario, this weakens transport security significantly.",
"title": "Vulnerability Description"
}
],
"product_status": {
"fixed": [
"CSAFPID-32001",
"CSAFPID-32002",
"CSAFPID-32003",
"CSAFPID-32004"
],
"known_affected": [
"CSAFPID-31001",
"CSAFPID-31002",
"CSAFPID-31003",
"CSAFPID-31004"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Phoenix Contact recommends operating network-capable devices in closed networks or protected with a suitable firewall. For detailed information on our recommendations for measures to protect network-capable devices, please refer to our application note: Measures to protect network-capable devices with Ethernet connection",
"group_ids": [
"CSAFGID-0001"
]
},
{
"category": "vendor_fix",
"details": "**Update to Firmware Release 2022.0.3 LTS or higher:**\n\n- AXC F 2152 (2404267) [Download](http://www.phoenixcontact.net/qr/2404267/firmware) \n- AXC F 1152 (1151412) [Download](http://www.phoenixcontact.net/qr/1151412/firmware) \n- AXC F 3152 (1069208) Not yet released\n\n**Update to PLCnext Engineer Release 2022.0.1 LTS or higher.**",
"group_ids": [
"CSAFGID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"environmentalScore": 5.3,
"environmentalSeverity": "MEDIUM",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"temporalScore": 5.3,
"temporalSeverity": "MEDIUM",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-31001",
"CSAFPID-31002",
"CSAFPID-31003",
"CSAFPID-31004"
]
}
],
"title": "CVE-2021-22897"
},
{
"cve": "CVE-2021-22925",
"cwe": {
"id": "CWE-908",
"name": "Use of Uninitialized Resource"
},
"notes": [
{
"category": "description",
"text": "curl supports the \u0027-t\u0027 command line option, known as \u0027CURLOPT_TELNETOPTIONS\u0027in libcurl. This rarely used option is used to send variable=content pairs toTELNET servers.Due to flaw in the option parser for sending \u0027NEW_ENV\u0027 variables, libcurlcould be made to pass on uninitialized data from a stack based buffer to theserver. Therefore potentially revealing sensitive internal information to theserver using a clear-text network protocol.This could happen because curl did not call and use sscanf() correctly whenparsing the string provided by the application.",
"title": "Vulnerability Description"
}
],
"product_status": {
"fixed": [
"CSAFPID-32001",
"CSAFPID-32002",
"CSAFPID-32003",
"CSAFPID-32004"
],
"known_affected": [
"CSAFPID-31001",
"CSAFPID-31002",
"CSAFPID-31003",
"CSAFPID-31004"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Phoenix Contact recommends operating network-capable devices in closed networks or protected with a suitable firewall. For detailed information on our recommendations for measures to protect network-capable devices, please refer to our application note: Measures to protect network-capable devices with Ethernet connection",
"group_ids": [
"CSAFGID-0001"
]
},
{
"category": "vendor_fix",
"details": "**Update to Firmware Release 2022.0.3 LTS or higher:**\n\n- AXC F 2152 (2404267) [Download](http://www.phoenixcontact.net/qr/2404267/firmware) \n- AXC F 1152 (1151412) [Download](http://www.phoenixcontact.net/qr/1151412/firmware) \n- AXC F 3152 (1069208) Not yet released\n\n**Update to PLCnext Engineer Release 2022.0.1 LTS or higher.**",
"group_ids": [
"CSAFGID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"environmentalScore": 5.3,
"environmentalSeverity": "MEDIUM",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"temporalScore": 5.3,
"temporalSeverity": "MEDIUM",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-31001",
"CSAFPID-31002",
"CSAFPID-31003",
"CSAFPID-31004"
]
}
],
"title": "CVE-2021-22925"
},
{
"cve": "CVE-2021-22923",
"cwe": {
"id": "CWE-319",
"name": "Cleartext Transmission of Sensitive Information"
},
"notes": [
{
"category": "description",
"text": "When curl is instructed to get content using the metalink feature, and a user name and password are used to download the metalink XML file, those same credentials are then subsequently passed on to each of the servers from which curl will download or try to download the contents from. Often contrary to the user\u0027s expectations and intentions and without telling the user it happened.",
"title": "Vulnerability Description"
}
],
"product_status": {
"fixed": [
"CSAFPID-32001",
"CSAFPID-32002",
"CSAFPID-32003",
"CSAFPID-32004"
],
"known_affected": [
"CSAFPID-31001",
"CSAFPID-31002",
"CSAFPID-31003",
"CSAFPID-31004"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Phoenix Contact recommends operating network-capable devices in closed networks or protected with a suitable firewall. For detailed information on our recommendations for measures to protect network-capable devices, please refer to our application note: Measures to protect network-capable devices with Ethernet connection",
"group_ids": [
"CSAFGID-0001"
]
},
{
"category": "vendor_fix",
"details": "**Update to Firmware Release 2022.0.3 LTS or higher:**\n\n- AXC F 2152 (2404267) [Download](http://www.phoenixcontact.net/qr/2404267/firmware) \n- AXC F 1152 (1151412) [Download](http://www.phoenixcontact.net/qr/1151412/firmware) \n- AXC F 3152 (1069208) Not yet released\n\n**Update to PLCnext Engineer Release 2022.0.1 LTS or higher.**",
"group_ids": [
"CSAFGID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"environmentalScore": 5.3,
"environmentalSeverity": "MEDIUM",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"temporalScore": 5.3,
"temporalSeverity": "MEDIUM",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-31001",
"CSAFPID-31002",
"CSAFPID-31003",
"CSAFPID-31004"
]
}
],
"title": "CVE-2021-22923"
},
{
"cve": "CVE-2021-22898",
"cwe": {
"id": "CWE-909",
"name": "Missing Initialization of Resource"
},
"notes": [
{
"category": "description",
"text": "curl 7.7 through 7.76.1 suffers from an information disclosure when the \u0027-t\u0027 command line option, known as \u0027CURLOPT_TELNETOPTIONS\u0027 in libcurl, is used to send variable=content pairs to TELNET servers. Due to a flaw in the option parser for sending NEW_ENV variables, libcurl could be made to pass on uninitialized data from a stack based buffer to the server, resulting in potentially revealing sensitive internal information to the server using a clear-text network protocol.",
"title": "Vulnerability Description"
}
],
"product_status": {
"fixed": [
"CSAFPID-32001",
"CSAFPID-32002",
"CSAFPID-32003",
"CSAFPID-32004"
],
"known_affected": [
"CSAFPID-31001",
"CSAFPID-31002",
"CSAFPID-31003",
"CSAFPID-31004"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Phoenix Contact recommends operating network-capable devices in closed networks or protected with a suitable firewall. For detailed information on our recommendations for measures to protect network-capable devices, please refer to our application note: Measures to protect network-capable devices with Ethernet connection",
"group_ids": [
"CSAFGID-0001"
]
},
{
"category": "vendor_fix",
"details": "**Update to Firmware Release 2022.0.3 LTS or higher:**\n\n- AXC F 2152 (2404267) [Download](http://www.phoenixcontact.net/qr/2404267/firmware) \n- AXC F 1152 (1151412) [Download](http://www.phoenixcontact.net/qr/1151412/firmware) \n- AXC F 3152 (1069208) Not yet released\n\n**Update to PLCnext Engineer Release 2022.0.1 LTS or higher.**",
"group_ids": [
"CSAFGID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 3.1,
"baseSeverity": "LOW",
"confidentialityImpact": "LOW",
"environmentalScore": 3.1,
"environmentalSeverity": "LOW",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"temporalScore": 3.1,
"temporalSeverity": "LOW",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-31001",
"CSAFPID-31002",
"CSAFPID-31003",
"CSAFPID-31004"
]
}
],
"title": "CVE-2021-22898"
},
{
"cve": "CVE-2021-42381",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"notes": [
{
"category": "description",
"text": "A use-after-free in Busybox\u0027s awk applet leads to denial of service and possibly code execution when processing a crafted awk pattern in the hash_init function",
"title": "Vulnerability Description"
}
],
"product_status": {
"fixed": [
"CSAFPID-32001",
"CSAFPID-32002",
"CSAFPID-32003",
"CSAFPID-32004"
],
"known_affected": [
"CSAFPID-31001",
"CSAFPID-31002",
"CSAFPID-31003",
"CSAFPID-31004"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Phoenix Contact recommends operating network-capable devices in closed networks or protected with a suitable firewall. For detailed information on our recommendations for measures to protect network-capable devices, please refer to our application note: Measures to protect network-capable devices with Ethernet connection",
"group_ids": [
"CSAFGID-0001"
]
},
{
"category": "vendor_fix",
"details": "**Update to Firmware Release 2022.0.3 LTS or higher:**\n\n- AXC F 2152 (2404267) [Download](http://www.phoenixcontact.net/qr/2404267/firmware) \n- AXC F 1152 (1151412) [Download](http://www.phoenixcontact.net/qr/1151412/firmware) \n- AXC F 3152 (1069208) Not yet released\n\n**Update to PLCnext Engineer Release 2022.0.1 LTS or higher.**",
"group_ids": [
"CSAFGID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.2,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"environmentalScore": 7.2,
"environmentalSeverity": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"temporalScore": 7.2,
"temporalSeverity": "HIGH",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-31001",
"CSAFPID-31002",
"CSAFPID-31003",
"CSAFPID-31004"
]
}
],
"title": "CVE-2021-42381"
},
{
"cve": "CVE-2021-42379",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"notes": [
{
"category": "description",
"text": "A use-after-free in Busybox\u0027s awk applet leads to denial of service and possibly code execution when processing a crafted awk pattern in the next_input_file function",
"title": "Vulnerability Description"
}
],
"product_status": {
"fixed": [
"CSAFPID-32001",
"CSAFPID-32002",
"CSAFPID-32003",
"CSAFPID-32004"
],
"known_affected": [
"CSAFPID-31001",
"CSAFPID-31002",
"CSAFPID-31003",
"CSAFPID-31004"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Phoenix Contact recommends operating network-capable devices in closed networks or protected with a suitable firewall. For detailed information on our recommendations for measures to protect network-capable devices, please refer to our application note: Measures to protect network-capable devices with Ethernet connection",
"group_ids": [
"CSAFGID-0001"
]
},
{
"category": "vendor_fix",
"details": "**Update to Firmware Release 2022.0.3 LTS or higher:**\n\n- AXC F 2152 (2404267) [Download](http://www.phoenixcontact.net/qr/2404267/firmware) \n- AXC F 1152 (1151412) [Download](http://www.phoenixcontact.net/qr/1151412/firmware) \n- AXC F 3152 (1069208) Not yet released\n\n**Update to PLCnext Engineer Release 2022.0.1 LTS or higher.**",
"group_ids": [
"CSAFGID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.2,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"environmentalScore": 7.2,
"environmentalSeverity": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"temporalScore": 7.2,
"temporalSeverity": "HIGH",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-31001",
"CSAFPID-31002",
"CSAFPID-31003",
"CSAFPID-31004"
]
}
],
"title": "CVE-2021-42379"
},
{
"cve": "CVE-2021-42384",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"notes": [
{
"category": "description",
"text": "A use-after-free in Busybox\u0027s awk applet leads to denial of service and possibly code execution when processing a crafted awk pattern in the handle_special function",
"title": "Vulnerability Description"
}
],
"product_status": {
"fixed": [
"CSAFPID-32001",
"CSAFPID-32002",
"CSAFPID-32003",
"CSAFPID-32004"
],
"known_affected": [
"CSAFPID-31001",
"CSAFPID-31002",
"CSAFPID-31003",
"CSAFPID-31004"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Phoenix Contact recommends operating network-capable devices in closed networks or protected with a suitable firewall. For detailed information on our recommendations for measures to protect network-capable devices, please refer to our application note: Measures to protect network-capable devices with Ethernet connection",
"group_ids": [
"CSAFGID-0001"
]
},
{
"category": "vendor_fix",
"details": "**Update to Firmware Release 2022.0.3 LTS or higher:**\n\n- AXC F 2152 (2404267) [Download](http://www.phoenixcontact.net/qr/2404267/firmware) \n- AXC F 1152 (1151412) [Download](http://www.phoenixcontact.net/qr/1151412/firmware) \n- AXC F 3152 (1069208) Not yet released\n\n**Update to PLCnext Engineer Release 2022.0.1 LTS or higher.**",
"group_ids": [
"CSAFGID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.2,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"environmentalScore": 7.2,
"environmentalSeverity": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"temporalScore": 7.2,
"temporalSeverity": "HIGH",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-31001",
"CSAFPID-31002",
"CSAFPID-31003",
"CSAFPID-31004"
]
}
],
"title": "CVE-2021-42384"
},
{
"cve": "CVE-2021-42378",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"notes": [
{
"category": "description",
"text": "A use-after-free in Busybox\u0027s awk applet leads to denial of service and possibly code execution when processing a crafted awk pattern in the getvar_i function",
"title": "Vulnerability Description"
}
],
"product_status": {
"fixed": [
"CSAFPID-32001",
"CSAFPID-32002",
"CSAFPID-32003",
"CSAFPID-32004"
],
"known_affected": [
"CSAFPID-31001",
"CSAFPID-31002",
"CSAFPID-31003",
"CSAFPID-31004"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Phoenix Contact recommends operating network-capable devices in closed networks or protected with a suitable firewall. For detailed information on our recommendations for measures to protect network-capable devices, please refer to our application note: Measures to protect network-capable devices with Ethernet connection",
"group_ids": [
"CSAFGID-0001"
]
},
{
"category": "vendor_fix",
"details": "**Update to Firmware Release 2022.0.3 LTS or higher:**\n\n- AXC F 2152 (2404267) [Download](http://www.phoenixcontact.net/qr/2404267/firmware) \n- AXC F 1152 (1151412) [Download](http://www.phoenixcontact.net/qr/1151412/firmware) \n- AXC F 3152 (1069208) Not yet released\n\n**Update to PLCnext Engineer Release 2022.0.1 LTS or higher.**",
"group_ids": [
"CSAFGID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.2,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"environmentalScore": 7.2,
"environmentalSeverity": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"temporalScore": 7.2,
"temporalSeverity": "HIGH",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-31001",
"CSAFPID-31002",
"CSAFPID-31003",
"CSAFPID-31004"
]
}
],
"title": "CVE-2021-42378"
},
{
"cve": "CVE-2021-42382",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"notes": [
{
"category": "description",
"text": "A use-after-free in Busybox\u0027s awk applet leads to denial of service and possibly code execution when processing a crafted awk pattern in the getvar_s function",
"title": "Vulnerability Description"
}
],
"product_status": {
"fixed": [
"CSAFPID-32001",
"CSAFPID-32002",
"CSAFPID-32003",
"CSAFPID-32004"
],
"known_affected": [
"CSAFPID-31001",
"CSAFPID-31002",
"CSAFPID-31003",
"CSAFPID-31004"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Phoenix Contact recommends operating network-capable devices in closed networks or protected with a suitable firewall. For detailed information on our recommendations for measures to protect network-capable devices, please refer to our application note: Measures to protect network-capable devices with Ethernet connection",
"group_ids": [
"CSAFGID-0001"
]
},
{
"category": "vendor_fix",
"details": "**Update to Firmware Release 2022.0.3 LTS or higher:**\n\n- AXC F 2152 (2404267) [Download](http://www.phoenixcontact.net/qr/2404267/firmware) \n- AXC F 1152 (1151412) [Download](http://www.phoenixcontact.net/qr/1151412/firmware) \n- AXC F 3152 (1069208) Not yet released\n\n**Update to PLCnext Engineer Release 2022.0.1 LTS or higher.**",
"group_ids": [
"CSAFGID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.2,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"environmentalScore": 7.2,
"environmentalSeverity": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"temporalScore": 7.2,
"temporalSeverity": "HIGH",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-31001",
"CSAFPID-31002",
"CSAFPID-31003",
"CSAFPID-31004"
]
}
],
"title": "CVE-2021-42382"
},
{
"cve": "CVE-2021-21300",
"cwe": {
"id": "CWE-59",
"name": "Improper Link Resolution Before File Access (\u0027Link Following\u0027)"
},
"notes": [
{
"category": "description",
"text": "Git is an open-source distributed revision control system. In affected versions of Git a specially crafted repository that contains symbolic links as well as files using a clean/smudge filter such as Git LFS, may cause just-checked out script to be executed while cloning onto a case-insensitive file system such as NTFS, HFS+ or APFS (i.e. the default file systems on Windows and macOS). Note that clean/smudge filters have to be configured for that. Git for Windows configures Git LFS by default, and is therefore vulnerable. The problem has been patched in the versions published on Tuesday, March 9th, 2021. As a workaound, if symbolic link support is disabled in Git (e.g. via \u0027git config --global core.symlinks false\u0027), the described attack won\u0027t work. Likewise, if no clean/smudge filters such as Git LFS are configured globally (i.e. _before_ cloning), the attack is foiled. As always, it is best to avoid cloning repositories from untrusted sources. The earliest impacted version is 2.14.2. The fix versions are: 2.30.1, 2.29.3, 2.28.1, 2.27.1, 2.26.3, 2.25.5, 2.24.4, 2.23.4, 2.22.5, 2.21.4, 2.20.5, 2.19.6, 2.18.5, 2.17.62.17.6.",
"title": "Vulnerability Description"
}
],
"product_status": {
"fixed": [
"CSAFPID-32001",
"CSAFPID-32002",
"CSAFPID-32003",
"CSAFPID-32004"
],
"known_affected": [
"CSAFPID-31001",
"CSAFPID-31002",
"CSAFPID-31003",
"CSAFPID-31004"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Phoenix Contact recommends operating network-capable devices in closed networks or protected with a suitable firewall. For detailed information on our recommendations for measures to protect network-capable devices, please refer to our application note: Measures to protect network-capable devices with Ethernet connection",
"group_ids": [
"CSAFGID-0001"
]
},
{
"category": "vendor_fix",
"details": "**Update to Firmware Release 2022.0.3 LTS or higher:**\n\n- AXC F 2152 (2404267) [Download](http://www.phoenixcontact.net/qr/2404267/firmware) \n- AXC F 1152 (1151412) [Download](http://www.phoenixcontact.net/qr/1151412/firmware) \n- AXC F 3152 (1069208) Not yet released\n\n**Update to PLCnext Engineer Release 2022.0.1 LTS or higher.**",
"group_ids": [
"CSAFGID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"environmentalScore": 7.5,
"environmentalSeverity": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"temporalScore": 7.5,
"temporalSeverity": "HIGH",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-31001",
"CSAFPID-31002",
"CSAFPID-31003",
"CSAFPID-31004"
]
}
],
"title": "CVE-2021-21300"
},
{
"cve": "CVE-2021-42380",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"notes": [
{
"category": "description",
"text": "A use-after-free in Busybox\u0027s awk applet leads to denial of service and possibly code execution when processing a crafted awk pattern in the clrvar function",
"title": "Vulnerability Description"
}
],
"product_status": {
"fixed": [
"CSAFPID-32001",
"CSAFPID-32002",
"CSAFPID-32003",
"CSAFPID-32004"
],
"known_affected": [
"CSAFPID-31001",
"CSAFPID-31002",
"CSAFPID-31003",
"CSAFPID-31004"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Phoenix Contact recommends operating network-capable devices in closed networks or protected with a suitable firewall. For detailed information on our recommendations for measures to protect network-capable devices, please refer to our application note: Measures to protect network-capable devices with Ethernet connection",
"group_ids": [
"CSAFGID-0001"
]
},
{
"category": "vendor_fix",
"details": "**Update to Firmware Release 2022.0.3 LTS or higher:**\n\n- AXC F 2152 (2404267) [Download](http://www.phoenixcontact.net/qr/2404267/firmware) \n- AXC F 1152 (1151412) [Download](http://www.phoenixcontact.net/qr/1151412/firmware) \n- AXC F 3152 (1069208) Not yet released\n\n**Update to PLCnext Engineer Release 2022.0.1 LTS or higher.**",
"group_ids": [
"CSAFGID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.2,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"environmentalScore": 7.2,
"environmentalSeverity": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"temporalScore": 7.2,
"temporalSeverity": "HIGH",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-31001",
"CSAFPID-31002",
"CSAFPID-31003",
"CSAFPID-31004"
]
}
],
"title": "CVE-2021-42380"
}
]
}
CVE-2021-42384
Vulnerability from fstec - Published: 08.12.2021{
"CVSS 2.0": "AV:N/AC:H/Au:N/C:C/I:C/A:C",
"CVSS 3.0": "AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H",
"CVSS 4.0": null,
"remediation_\u0418\u0434\u0435\u043d\u0442\u0438\u0444\u0438\u043a\u0430\u0442\u043e\u0440": null,
"remediation_\u041d\u0430\u0438\u043c\u0435\u043d\u043e\u0432\u0430\u043d\u0438\u0435": null,
"\u0412\u0435\u043d\u0434\u043e\u0440 \u041f\u041e": "\u0421\u043e\u043e\u0431\u0449\u0435\u0441\u0442\u0432\u043e \u0441\u0432\u043e\u0431\u043e\u0434\u043d\u043e\u0433\u043e \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u043e\u0433\u043e \u043e\u0431\u0435\u0441\u043f\u0435\u0447\u0435\u043d\u0438\u044f, \u0410\u041e \u00ab\u041a\u043e\u043d\u0446\u0435\u0440\u043d \u0412\u041d\u0418\u0418\u041d\u0421\u00bb, \u041e\u041e\u041e \u00ab\u0420\u0435\u0434 \u0421\u043e\u0444\u0442\u00bb, \u041e\u041e\u041e \u00ab\u0420\u0443\u0441\u0411\u0418\u0422\u0435\u0445-\u0410\u0441\u0442\u0440\u0430\u00bb, \u0410\u041e \"\u041d\u041f\u041f\u041a\u0422\"",
"\u0412\u0435\u0440\u0441\u0438\u044f \u041f\u041e": "9 (Debian GNU/Linux), 10 (Debian GNU/Linux), 1.0 (\u041e\u0421 \u041e\u041d \u00ab\u0421\u0442\u0440\u0435\u043b\u0435\u0446\u00bb), 11 (Debian GNU/Linux), 7.3 (\u0420\u0415\u0414 \u041e\u0421), \u043e\u0442 1.27.0 \u0434\u043e 1.33.1 \u0432\u043a\u043b\u044e\u0447\u0438\u0442\u0435\u043b\u044c\u043d\u043e (BusyBox), 1.7 (Astra Linux Special Edition), \u0434\u043e 2.4.3 (\u041e\u0421\u041e\u041d \u041e\u0421\u043d\u043e\u0432\u0430 \u041enyx)",
"\u0412\u043e\u0437\u043c\u043e\u0436\u043d\u044b\u0435 \u043c\u0435\u0440\u044b \u043f\u043e \u0443\u0441\u0442\u0440\u0430\u043d\u0435\u043d\u0438\u044e": "\u0418\u0441\u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u043d\u0438\u0435 \u0440\u0435\u043a\u043e\u043c\u0435\u043d\u0434\u0430\u0446\u0438\u0439:\n\u0414\u043b\u044f BusyBox:\n\u041e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u0435 \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u043e\u0433\u043e \u043e\u0431\u0435\u0441\u043f\u0435\u0447\u0435\u043d\u0438\u044f \u0434\u043e \u0430\u043a\u0442\u0443\u0430\u043b\u044c\u043d\u043e\u0439 \u0432\u0435\u0440\u0441\u0438\u0438\n\n\u0414\u043b\u044f \u0420\u0435\u0434\u041e\u0421:\nhttp://repo.red-soft.ru/redos/7.3c/x86_64/updates/\n\n\u0414\u043b\u044f Debian GNU/Linux:\nhttps://security-tracker.debian.org/tracker/CVE-2021-42384\n\n\u0414\u043b\u044f \u041e\u0421 \u041e\u041d \u00ab\u0421\u0442\u0440\u0435\u043b\u0435\u0446\u00bb:\n\nhttps://strelets.net/patchi-i-obnovleniya-bezopasnosti#kumulyativnoe-obnovlenie\n\n\u0414\u043b\u044f \u041e\u0421\u041e\u041d \u041e\u0441\u043d\u043e\u0432\u0430:\n\u041e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u0435 \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u043e\u0433\u043e \u043e\u0431\u0435\u0441\u043f\u0435\u0447\u0435\u043d\u0438\u044f busybox \u0434\u043e \u0432\u0435\u0440\u0441\u0438\u0438 1:1.30.1-7ubuntu3osnova4\n\n\u0414\u043b\u044f Astra Linux Special Edition 1.7: https://wiki.astralinux.ru/astra-linux-se17-bulletin-2023-0303SE17MD\n\n",
"\u0414\u0430\u0442\u0430 \u0432\u044b\u044f\u0432\u043b\u0435\u043d\u0438\u044f": "08.12.2021",
"\u0414\u0430\u0442\u0430 \u043f\u043e\u0441\u043b\u0435\u0434\u043d\u0435\u0433\u043e \u043e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u044f": "03.04.2024",
"\u0414\u0430\u0442\u0430 \u043f\u0443\u0431\u043b\u0438\u043a\u0430\u0446\u0438\u0438": "28.12.2021",
"\u0418\u0434\u0435\u043d\u0442\u0438\u0444\u0438\u043a\u0430\u0442\u043e\u0440": "BDU:2021-06387",
"\u0418\u0434\u0435\u043d\u0442\u0438\u0444\u0438\u043a\u0430\u0442\u043e\u0440\u044b \u0434\u0440\u0443\u0433\u0438\u0445 \u0441\u0438\u0441\u0442\u0435\u043c \u043e\u043f\u0438\u0441\u0430\u043d\u0438\u0439 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "CVE-2021-42384",
"\u0418\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0438\u044f \u043e\u0431 \u0443\u0441\u0442\u0440\u0430\u043d\u0435\u043d\u0438\u0438": "\u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u0443\u0441\u0442\u0440\u0430\u043d\u0435\u043d\u0430",
"\u041a\u043b\u0430\u0441\u0441 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u043a\u043e\u0434\u0430",
"\u041d\u0430\u0437\u0432\u0430\u043d\u0438\u0435 \u041f\u041e": "Debian GNU/Linux, \u041e\u0421 \u041e\u041d \u00ab\u0421\u0442\u0440\u0435\u043b\u0435\u0446\u00bb (\u0437\u0430\u043f\u0438\u0441\u044c \u0432 \u0435\u0434\u0438\u043d\u043e\u043c \u0440\u0435\u0435\u0441\u0442\u0440\u0435 \u0440\u043e\u0441\u0441\u0438\u0439\u0441\u043a\u0438\u0445 \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c \u21166177), \u0420\u0415\u0414 \u041e\u0421 (\u0437\u0430\u043f\u0438\u0441\u044c \u0432 \u0435\u0434\u0438\u043d\u043e\u043c \u0440\u0435\u0435\u0441\u0442\u0440\u0435 \u0440\u043e\u0441\u0441\u0438\u0439\u0441\u043a\u0438\u0445 \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c \u21163751), BusyBox, Astra Linux Special Edition (\u0437\u0430\u043f\u0438\u0441\u044c \u0432 \u0435\u0434\u0438\u043d\u043e\u043c \u0440\u0435\u0435\u0441\u0442\u0440\u0435 \u0440\u043e\u0441\u0441\u0438\u0439\u0441\u043a\u0438\u0445 \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c \u2116369), \u041e\u0421\u041e\u041d \u041e\u0421\u043d\u043e\u0432\u0430 \u041enyx (\u0437\u0430\u043f\u0438\u0441\u044c \u0432 \u0435\u0434\u0438\u043d\u043e\u043c \u0440\u0435\u0435\u0441\u0442\u0440\u0435 \u0440\u043e\u0441\u0441\u0438\u0439\u0441\u043a\u0438\u0445 \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c \u21165913)",
"\u041d\u0430\u0438\u043c\u0435\u043d\u043e\u0432\u0430\u043d\u0438\u0435 \u041e\u0421 \u0438 \u0442\u0438\u043f \u0430\u043f\u043f\u0430\u0440\u0430\u0442\u043d\u043e\u0439 \u043f\u043b\u0430\u0442\u0444\u043e\u0440\u043c\u044b": "\u0421\u043e\u043e\u0431\u0449\u0435\u0441\u0442\u0432\u043e \u0441\u0432\u043e\u0431\u043e\u0434\u043d\u043e\u0433\u043e \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u043e\u0433\u043e \u043e\u0431\u0435\u0441\u043f\u0435\u0447\u0435\u043d\u0438\u044f Debian GNU/Linux 9 , \u0421\u043e\u043e\u0431\u0449\u0435\u0441\u0442\u0432\u043e \u0441\u0432\u043e\u0431\u043e\u0434\u043d\u043e\u0433\u043e \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u043e\u0433\u043e \u043e\u0431\u0435\u0441\u043f\u0435\u0447\u0435\u043d\u0438\u044f Debian GNU/Linux 10 , \u0421\u043e\u043e\u0431\u0449\u0435\u0441\u0442\u0432\u043e \u0441\u0432\u043e\u0431\u043e\u0434\u043d\u043e\u0433\u043e \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u043e\u0433\u043e \u043e\u0431\u0435\u0441\u043f\u0435\u0447\u0435\u043d\u0438\u044f Debian GNU/Linux 11 , \u041e\u041e\u041e \u00ab\u0420\u0435\u0434 \u0421\u043e\u0444\u0442\u00bb \u0420\u0415\u0414 \u041e\u0421 7.3 (\u0437\u0430\u043f\u0438\u0441\u044c \u0432 \u0435\u0434\u0438\u043d\u043e\u043c \u0440\u0435\u0435\u0441\u0442\u0440\u0435 \u0440\u043e\u0441\u0441\u0438\u0439\u0441\u043a\u0438\u0445 \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c \u21163751), \u041e\u041e\u041e \u00ab\u0420\u0443\u0441\u0411\u0418\u0422\u0435\u0445-\u0410\u0441\u0442\u0440\u0430\u00bb Astra Linux Special Edition 1.7 (\u0437\u0430\u043f\u0438\u0441\u044c \u0432 \u0435\u0434\u0438\u043d\u043e\u043c \u0440\u0435\u0435\u0441\u0442\u0440\u0435 \u0440\u043e\u0441\u0441\u0438\u0439\u0441\u043a\u0438\u0445 \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c \u2116369)",
"\u041d\u0430\u0438\u043c\u0435\u043d\u043e\u0432\u0430\u043d\u0438\u0435 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u043d\u0430\u0431\u043e\u0440\u0430 \u0443\u0442\u0438\u043b\u0438\u0442 \u043a\u043e\u043c\u0430\u043d\u0434\u043d\u043e\u0439 \u0441\u0442\u0440\u043e\u043a\u0438 BusyBox, \u0441\u0432\u044f\u0437\u0430\u043d\u043d\u0430\u044f \u0441 \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u043d\u0438\u0435\u043c \u043f\u0430\u043c\u044f\u0442\u0438 \u043f\u043e\u0441\u043b\u0435 \u043e\u0441\u0432\u043e\u0431\u043e\u0436\u0434\u0435\u043d\u0438\u044f, \u043f\u043e\u0437\u0432\u043e\u043b\u044f\u044e\u0449\u0430\u044f \u043d\u0430\u0440\u0443\u0448\u0438\u0442\u0435\u043b\u044e \u0441\u043a\u043e\u043c\u043f\u0440\u043e\u043c\u0435\u0442\u0438\u0440\u043e\u0432\u0430\u0442\u044c \u0443\u044f\u0437\u0432\u0438\u043c\u0443\u044e \u0441\u0438\u0441\u0442\u0435\u043c\u0443",
"\u041d\u0430\u043b\u0438\u0447\u0438\u0435 \u044d\u043a\u0441\u043f\u043b\u043e\u0439\u0442\u0430": "\u0414\u0430\u043d\u043d\u044b\u0435 \u0443\u0442\u043e\u0447\u043d\u044f\u044e\u0442\u0441\u044f",
"\u041e\u043f\u0438\u0441\u0430\u043d\u0438\u0435 \u043e\u0448\u0438\u0431\u043a\u0438 CWE": "\u0418\u0441\u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u043d\u0438\u0435 \u043f\u043e\u0441\u043b\u0435 \u043e\u0441\u0432\u043e\u0431\u043e\u0436\u0434\u0435\u043d\u0438\u044f (CWE-416)",
"\u041e\u043f\u0438\u0441\u0430\u043d\u0438\u0435 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u043d\u0430\u0431\u043e\u0440\u0430 \u0443\u0442\u0438\u043b\u0438\u0442 \u043a\u043e\u043c\u0430\u043d\u0434\u043d\u043e\u0439 \u0441\u0442\u0440\u043e\u043a\u0438 BusyBox \u0441\u0432\u044f\u0437\u0430\u043d\u0430 \u0441 \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u043d\u0438\u0435\u043c \u043f\u0430\u043c\u044f\u0442\u0438 \u043f\u043e\u0441\u043b\u0435 \u043e\u0441\u0432\u043e\u0431\u043e\u0436\u0434\u0435\u043d\u0438\u044f. \u042d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0430\u0446\u0438\u044f \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438 \u043c\u043e\u0436\u0435\u0442 \u043f\u043e\u0437\u0432\u043e\u043b\u0438\u0442\u044c \u043d\u0430\u0440\u0443\u0448\u0438\u0442\u0435\u043b\u044e, \u0434\u0435\u0439\u0441\u0442\u0432\u0443\u044e\u0449\u0435\u043c\u0443 \u0443\u0434\u0430\u043b\u0435\u043d\u043d\u043e, \u0432\u044b\u043f\u043e\u043b\u043d\u0438\u0442\u044c \u043f\u0440\u043e\u0438\u0437\u0432\u043e\u043b\u044c\u043d\u044b\u0439 \u043a\u043e\u0434",
"\u041f\u043e\u0441\u043b\u0435\u0434\u0441\u0442\u0432\u0438\u044f \u044d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0430\u0446\u0438\u0438 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": null,
"\u041f\u0440\u043e\u0447\u0430\u044f \u0438\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0438\u044f": null,
"\u0421\u0432\u044f\u0437\u044c \u0441 \u0438\u043d\u0446\u0438\u0434\u0435\u043d\u0442\u0430\u043c\u0438 \u0418\u0411": "\u0414\u0430\u043d\u043d\u044b\u0435 \u0443\u0442\u043e\u0447\u043d\u044f\u044e\u0442\u0441\u044f",
"\u0421\u043e\u0441\u0442\u043e\u044f\u043d\u0438\u0435 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u041e\u043f\u0443\u0431\u043b\u0438\u043a\u043e\u0432\u0430\u043d\u0430",
"\u0421\u043f\u043e\u0441\u043e\u0431 \u0443\u0441\u0442\u0440\u0430\u043d\u0435\u043d\u0438\u044f": "\u041e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u0435 \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u043e\u0433\u043e \u043e\u0431\u0435\u0441\u043f\u0435\u0447\u0435\u043d\u0438\u044f",
"\u0421\u043f\u043e\u0441\u043e\u0431 \u044d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0430\u0446\u0438\u0438": "\u041c\u0430\u043d\u0438\u043f\u0443\u043b\u0438\u0440\u043e\u0432\u0430\u043d\u0438\u0435 \u0441\u0442\u0440\u0443\u043a\u0442\u0443\u0440\u0430\u043c\u0438 \u0434\u0430\u043d\u043d\u044b\u0445",
"\u0421\u0441\u044b\u043b\u043a\u0438 \u043d\u0430 \u0438\u0441\u0442\u043e\u0447\u043d\u0438\u043a\u0438": "https://redos.red-soft.ru/support/secure/\nhttps://security-tracker.debian.org/tracker/CVE-2021-42384\nhttps://strelets.net/patchi-i-obnovleniya-bezopasnosti#26012022\nhttps://www.cybersecurity-help.cz/vdb/SB2021120809\nhttps://\u043f\u043e\u0434\u0434\u0435\u0440\u0436\u043a\u0430.\u043d\u043f\u043f\u043a\u0442.\u0440\u0444/bin/view/\u041e\u0421\u043d\u043e\u0432\u0430/\u041e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u044f/2.4.3/\nhttps://wiki.astralinux.ru/astra-linux-se17-bulletin-2023-0303SE17MD\nhttps://\u043f\u043e\u0434\u0434\u0435\u0440\u0436\u043a\u0430.\u043d\u043f\u043f\u043a\u0442.\u0440\u0444/bin/view/\u041e\u0421\u043d\u043e\u0432\u0430/\u041e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u044f/2.5/",
"\u0421\u0442\u0430\u0442\u0443\u0441 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u041f\u043e\u0434\u0442\u0432\u0435\u0440\u0436\u0434\u0435\u043d\u0430 \u043f\u0440\u043e\u0438\u0437\u0432\u043e\u0434\u0438\u0442\u0435\u043b\u0435\u043c",
"\u0422\u0438\u043f \u041f\u041e": "\u041e\u043f\u0435\u0440\u0430\u0446\u0438\u043e\u043d\u043d\u0430\u044f \u0441\u0438\u0441\u0442\u0435\u043c\u0430, \u041f\u0440\u0438\u043a\u043b\u0430\u0434\u043d\u043e\u0435 \u041f\u041e \u0438\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0438\u043e\u043d\u043d\u044b\u0445 \u0441\u0438\u0441\u0442\u0435\u043c",
"\u0422\u0438\u043f \u043e\u0448\u0438\u0431\u043a\u0438 CWE": "CWE-416",
"\u0423\u0440\u043e\u0432\u0435\u043d\u044c \u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u0412\u044b\u0441\u043e\u043a\u0438\u0439 \u0443\u0440\u043e\u0432\u0435\u043d\u044c \u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438 (\u0431\u0430\u0437\u043e\u0432\u0430\u044f \u043e\u0446\u0435\u043d\u043a\u0430 CVSS 2.0 \u0441\u043e\u0441\u0442\u0430\u0432\u043b\u044f\u0435\u0442 7,6)\n\u0421\u0440\u0435\u0434\u043d\u0438\u0439 \u0443\u0440\u043e\u0432\u0435\u043d\u044c \u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438 (\u0431\u0430\u0437\u043e\u0432\u0430\u044f \u043e\u0446\u0435\u043d\u043a\u0430 CVSS 3.0 \u0441\u043e\u0441\u0442\u0430\u0432\u043b\u044f\u0435\u0442 6,6)"
}
OPENSUSE-SU-2022:0135-1
Vulnerability from csaf_opensuse - Published: 2022-01-20 09:04 - Updated: 2022-01-20 09:04Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for busybox",
"title": "Title of the patch"
},
{
"category": "description",
"text": "This update for busybox fixes the following issues:\n\n- CVE-2011-5325: Fixed tar directory traversal (bsc#951562).\n- CVE-2015-9261: Fixed segfalts and application crashes in huft_build (bsc#1102912).\n- CVE-2016-2147: Fixed out of bounds write (heap) due to integer underflow in udhcpc (bsc#970663).\n- CVE-2016-2148: Fixed heap-based buffer overflow in OPTION_6RD parsing (bsc#970662).\n- CVE-2016-6301: Fixed NTP server denial of service flaw (bsc#991940).\n- CVE-2017-15873: Fixed integer overflow in get_next_block function in archival/libarchive/decompress_bunzip2.c (bsc#1064976).\n- CVE-2017-15874: Fixed integer underflow in archival/libarchive/decompress_unlzma.c (bsc#1064978).\n- CVE-2017-16544: Fixed Insufficient sanitization of filenames when autocompleting (bsc#1069412).\n- CVE-2018-1000500 : Fixed missing SSL certificate validation in wget (bsc#1099263).\n- CVE-2018-1000517: Fixed heap-based buffer overflow in the retrieve_file_data() (bsc#1099260).\n- CVE-2018-20679: Fixed out of bounds read in udhcp (bsc#1121426).\n- CVE-2019-5747: Fixed out of bounds read in udhcp components (bsc#1121428).\n- CVE-2021-28831: Fixed invalid free or segmentation fault via malformed gzip data (bsc#1184522).\n- CVE-2021-42373: Fixed NULL pointer dereference in man leading to DoS when a section name is supplied but no page argument is given (bsc#1192869).\n- CVE-2021-42374: Fixed out-of-bounds heap read in unlzma leading to information leak and DoS when crafted LZMA-compressed input is decompressed (bsc#1192869).\n- CVE-2021-42375: Fixed incorrect handling of a special element in ash leading to DoS when processing a crafted shell command, due to the shell mistaking specific characters for reserved characters (bsc#1192869).\n- CVE-2021-42376: Fixed NULL pointer dereference in hush leading to DoS when processing a crafted shell command (bsc#1192869).\n- CVE-2021-42377: Fixed attacker-controlled pointer free in hush leading to DoS and possible code execution when processing a crafted shell command (bsc#1192869).\n- CVE-2021-42378: Fixed use-after-free in awk leading to DoS and possibly code execution when processing a crafted awk pattern in the getvar_i function (bsc#1192869).\n- CVE-2021-42379: Fixed use-after-free in awk leading to DoS and possibly code execution when processing a crafted awk pattern in the next_input_file function (bsc#1192869).\n- CVE-2021-42380: Fixed use-after-free in awk leading to DoS and possibly code execution when processing a crafted awk pattern in the clrvar function (bsc#1192869).\n- CVE-2021-42381: Fixed use-after-free in awk leading to DoS and possibly code execution when processing a crafted awk pattern in the hash_init function (bsc#1192869).\n- CVE-2021-42382: Fixed use-after-free in awk leading to DoS and possibly code execution when processing a crafted awk pattern in the getvar_s function (bsc#1192869).\n- CVE-2021-42383: Fixed use-after-free in awk leading to DoS and possibly code execution when processing a crafted awk pattern in the evaluate function (bsc#1192869).\n- CVE-2021-42384: Fixed use-after-free in awk leading to DoS and possibly code execution when processing a crafted awk pattern in the handle_special function (bsc#1192869).\n- CVE-2021-42385: Fixed use-after-free in awk leading to DoS and possibly code execution when processing a crafted awk pattern in the evaluate function (bsc#1192869).\n- CVE-2021-42386: Fixed use-after-free in awk leading to DoS and possibly code execution when processing a crafted awk pattern in the nvalloc function (bsc#1192869).\n",
"title": "Description of the patch"
},
{
"category": "details",
"text": "openSUSE-2022-135,openSUSE-SLE-15.3-2022-135",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2022_0135-1.json"
},
{
"category": "self",
"summary": "URL for openSUSE-SU-2022:0135-1",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/YB6DIPEMLRTDD3RU77DD7UYYKBEEKYDY/"
},
{
"category": "self",
"summary": "E-Mail link for openSUSE-SU-2022:0135-1",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/YB6DIPEMLRTDD3RU77DD7UYYKBEEKYDY/"
},
{
"category": "self",
"summary": "SUSE Bug 1064976",
"url": "https://bugzilla.suse.com/1064976"
},
{
"category": "self",
"summary": "SUSE Bug 1064978",
"url": "https://bugzilla.suse.com/1064978"
},
{
"category": "self",
"summary": "SUSE Bug 1069412",
"url": "https://bugzilla.suse.com/1069412"
},
{
"category": "self",
"summary": "SUSE Bug 1099260",
"url": "https://bugzilla.suse.com/1099260"
},
{
"category": "self",
"summary": "SUSE Bug 1099263",
"url": "https://bugzilla.suse.com/1099263"
},
{
"category": "self",
"summary": "SUSE Bug 1102912",
"url": "https://bugzilla.suse.com/1102912"
},
{
"category": "self",
"summary": "SUSE Bug 1121426",
"url": "https://bugzilla.suse.com/1121426"
},
{
"category": "self",
"summary": "SUSE Bug 1121428",
"url": "https://bugzilla.suse.com/1121428"
},
{
"category": "self",
"summary": "SUSE Bug 1184522",
"url": "https://bugzilla.suse.com/1184522"
},
{
"category": "self",
"summary": "SUSE Bug 1192869",
"url": "https://bugzilla.suse.com/1192869"
},
{
"category": "self",
"summary": "SUSE Bug 951562",
"url": "https://bugzilla.suse.com/951562"
},
{
"category": "self",
"summary": "SUSE Bug 970662",
"url": "https://bugzilla.suse.com/970662"
},
{
"category": "self",
"summary": "SUSE Bug 970663",
"url": "https://bugzilla.suse.com/970663"
},
{
"category": "self",
"summary": "SUSE Bug 991940",
"url": "https://bugzilla.suse.com/991940"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2011-5325 page",
"url": "https://www.suse.com/security/cve/CVE-2011-5325/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2015-9261 page",
"url": "https://www.suse.com/security/cve/CVE-2015-9261/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2016-2147 page",
"url": "https://www.suse.com/security/cve/CVE-2016-2147/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2016-2148 page",
"url": "https://www.suse.com/security/cve/CVE-2016-2148/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2016-6301 page",
"url": "https://www.suse.com/security/cve/CVE-2016-6301/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-15873 page",
"url": "https://www.suse.com/security/cve/CVE-2017-15873/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-15874 page",
"url": "https://www.suse.com/security/cve/CVE-2017-15874/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-16544 page",
"url": "https://www.suse.com/security/cve/CVE-2017-16544/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2018-1000500 page",
"url": "https://www.suse.com/security/cve/CVE-2018-1000500/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2018-1000517 page",
"url": "https://www.suse.com/security/cve/CVE-2018-1000517/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2018-20679 page",
"url": "https://www.suse.com/security/cve/CVE-2018-20679/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-5747 page",
"url": "https://www.suse.com/security/cve/CVE-2019-5747/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-28831 page",
"url": "https://www.suse.com/security/cve/CVE-2021-28831/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-42373 page",
"url": "https://www.suse.com/security/cve/CVE-2021-42373/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-42374 page",
"url": "https://www.suse.com/security/cve/CVE-2021-42374/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-42375 page",
"url": "https://www.suse.com/security/cve/CVE-2021-42375/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-42376 page",
"url": "https://www.suse.com/security/cve/CVE-2021-42376/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-42377 page",
"url": "https://www.suse.com/security/cve/CVE-2021-42377/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-42378 page",
"url": "https://www.suse.com/security/cve/CVE-2021-42378/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-42379 page",
"url": "https://www.suse.com/security/cve/CVE-2021-42379/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-42380 page",
"url": "https://www.suse.com/security/cve/CVE-2021-42380/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-42381 page",
"url": "https://www.suse.com/security/cve/CVE-2021-42381/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-42382 page",
"url": "https://www.suse.com/security/cve/CVE-2021-42382/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-42383 page",
"url": "https://www.suse.com/security/cve/CVE-2021-42383/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-42384 page",
"url": "https://www.suse.com/security/cve/CVE-2021-42384/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-42385 page",
"url": "https://www.suse.com/security/cve/CVE-2021-42385/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-42386 page",
"url": "https://www.suse.com/security/cve/CVE-2021-42386/"
}
],
"title": "Security update for busybox",
"tracking": {
"current_release_date": "2022-01-20T09:04:27Z",
"generator": {
"date": "2022-01-20T09:04:27Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "openSUSE-SU-2022:0135-1",
"initial_release_date": "2022-01-20T09:04:27Z",
"revision_history": [
{
"date": "2022-01-20T09:04:27Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "busybox-1.34.1-4.9.1.aarch64",
"product": {
"name": "busybox-1.34.1-4.9.1.aarch64",
"product_id": "busybox-1.34.1-4.9.1.aarch64"
}
},
{
"category": "product_version",
"name": "busybox-static-1.34.1-4.9.1.aarch64",
"product": {
"name": "busybox-static-1.34.1-4.9.1.aarch64",
"product_id": "busybox-static-1.34.1-4.9.1.aarch64"
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "virtualbox-guest-desktop-icons-6.1.34-lp153.2.27.2.noarch",
"product": {
"name": "virtualbox-guest-desktop-icons-6.1.34-lp153.2.27.2.noarch",
"product_id": "virtualbox-guest-desktop-icons-6.1.34-lp153.2.27.2.noarch"
}
},
{
"category": "product_version",
"name": "virtualbox-guest-source-6.1.34-lp153.2.27.2.noarch",
"product": {
"name": "virtualbox-guest-source-6.1.34-lp153.2.27.2.noarch",
"product_id": "virtualbox-guest-source-6.1.34-lp153.2.27.2.noarch"
}
},
{
"category": "product_version",
"name": "virtualbox-host-source-6.1.34-lp153.2.27.2.noarch",
"product": {
"name": "virtualbox-host-source-6.1.34-lp153.2.27.2.noarch",
"product_id": "virtualbox-host-source-6.1.34-lp153.2.27.2.noarch"
}
}
],
"category": "architecture",
"name": "noarch"
},
{
"branches": [
{
"category": "product_version",
"name": "busybox-1.34.1-4.9.1.ppc64le",
"product": {
"name": "busybox-1.34.1-4.9.1.ppc64le",
"product_id": "busybox-1.34.1-4.9.1.ppc64le"
}
},
{
"category": "product_version",
"name": "busybox-static-1.34.1-4.9.1.ppc64le",
"product": {
"name": "busybox-static-1.34.1-4.9.1.ppc64le",
"product_id": "busybox-static-1.34.1-4.9.1.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "busybox-1.34.1-4.9.1.s390x",
"product": {
"name": "busybox-1.34.1-4.9.1.s390x",
"product_id": "busybox-1.34.1-4.9.1.s390x"
}
},
{
"category": "product_version",
"name": "busybox-static-1.34.1-4.9.1.s390x",
"product": {
"name": "busybox-static-1.34.1-4.9.1.s390x",
"product_id": "busybox-static-1.34.1-4.9.1.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "python3-virtualbox-6.1.34-lp153.2.27.2.x86_64",
"product": {
"name": "python3-virtualbox-6.1.34-lp153.2.27.2.x86_64",
"product_id": "python3-virtualbox-6.1.34-lp153.2.27.2.x86_64"
}
},
{
"category": "product_version",
"name": "virtualbox-6.1.34-lp153.2.27.2.x86_64",
"product": {
"name": "virtualbox-6.1.34-lp153.2.27.2.x86_64",
"product_id": "virtualbox-6.1.34-lp153.2.27.2.x86_64"
}
},
{
"category": "product_version",
"name": "virtualbox-devel-6.1.34-lp153.2.27.2.x86_64",
"product": {
"name": "virtualbox-devel-6.1.34-lp153.2.27.2.x86_64",
"product_id": "virtualbox-devel-6.1.34-lp153.2.27.2.x86_64"
}
},
{
"category": "product_version",
"name": "virtualbox-guest-tools-6.1.34-lp153.2.27.2.x86_64",
"product": {
"name": "virtualbox-guest-tools-6.1.34-lp153.2.27.2.x86_64",
"product_id": "virtualbox-guest-tools-6.1.34-lp153.2.27.2.x86_64"
}
},
{
"category": "product_version",
"name": "virtualbox-guest-x11-6.1.34-lp153.2.27.2.x86_64",
"product": {
"name": "virtualbox-guest-x11-6.1.34-lp153.2.27.2.x86_64",
"product_id": "virtualbox-guest-x11-6.1.34-lp153.2.27.2.x86_64"
}
},
{
"category": "product_version",
"name": "virtualbox-kmp-default-6.1.34_k5.3.18_150300.59.63-lp153.2.27.1.x86_64",
"product": {
"name": "virtualbox-kmp-default-6.1.34_k5.3.18_150300.59.63-lp153.2.27.1.x86_64",
"product_id": "virtualbox-kmp-default-6.1.34_k5.3.18_150300.59.63-lp153.2.27.1.x86_64"
}
},
{
"category": "product_version",
"name": "virtualbox-kmp-preempt-6.1.34_k5.3.18_150300.59.63-lp153.2.27.1.x86_64",
"product": {
"name": "virtualbox-kmp-preempt-6.1.34_k5.3.18_150300.59.63-lp153.2.27.1.x86_64",
"product_id": "virtualbox-kmp-preempt-6.1.34_k5.3.18_150300.59.63-lp153.2.27.1.x86_64"
}
},
{
"category": "product_version",
"name": "virtualbox-qt-6.1.34-lp153.2.27.2.x86_64",
"product": {
"name": "virtualbox-qt-6.1.34-lp153.2.27.2.x86_64",
"product_id": "virtualbox-qt-6.1.34-lp153.2.27.2.x86_64"
}
},
{
"category": "product_version",
"name": "virtualbox-vnc-6.1.34-lp153.2.27.2.x86_64",
"product": {
"name": "virtualbox-vnc-6.1.34-lp153.2.27.2.x86_64",
"product_id": "virtualbox-vnc-6.1.34-lp153.2.27.2.x86_64"
}
},
{
"category": "product_version",
"name": "virtualbox-websrv-6.1.34-lp153.2.27.2.x86_64",
"product": {
"name": "virtualbox-websrv-6.1.34-lp153.2.27.2.x86_64",
"product_id": "virtualbox-websrv-6.1.34-lp153.2.27.2.x86_64"
}
},
{
"category": "product_version",
"name": "busybox-1.34.1-4.9.1.x86_64",
"product": {
"name": "busybox-1.34.1-4.9.1.x86_64",
"product_id": "busybox-1.34.1-4.9.1.x86_64"
}
},
{
"category": "product_version",
"name": "busybox-static-1.34.1-4.9.1.x86_64",
"product": {
"name": "busybox-static-1.34.1-4.9.1.x86_64",
"product_id": "busybox-static-1.34.1-4.9.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "openSUSE Leap 15.3",
"product": {
"name": "openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3",
"product_identification_helper": {
"cpe": "cpe:/o:opensuse:leap:15.3"
}
}
},
{
"category": "product_name",
"name": "openSUSE Leap 15.3",
"product": {
"name": "openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3",
"product_identification_helper": {
"cpe": "cpe:/o:opensuse:leap:15.3"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-virtualbox-6.1.34-lp153.2.27.2.x86_64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:python3-virtualbox-6.1.34-lp153.2.27.2.x86_64"
},
"product_reference": "python3-virtualbox-6.1.34-lp153.2.27.2.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "virtualbox-6.1.34-lp153.2.27.2.x86_64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:virtualbox-6.1.34-lp153.2.27.2.x86_64"
},
"product_reference": "virtualbox-6.1.34-lp153.2.27.2.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "virtualbox-devel-6.1.34-lp153.2.27.2.x86_64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:virtualbox-devel-6.1.34-lp153.2.27.2.x86_64"
},
"product_reference": "virtualbox-devel-6.1.34-lp153.2.27.2.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "virtualbox-guest-desktop-icons-6.1.34-lp153.2.27.2.noarch as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:virtualbox-guest-desktop-icons-6.1.34-lp153.2.27.2.noarch"
},
"product_reference": "virtualbox-guest-desktop-icons-6.1.34-lp153.2.27.2.noarch",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "virtualbox-guest-source-6.1.34-lp153.2.27.2.noarch as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:virtualbox-guest-source-6.1.34-lp153.2.27.2.noarch"
},
"product_reference": "virtualbox-guest-source-6.1.34-lp153.2.27.2.noarch",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "virtualbox-guest-tools-6.1.34-lp153.2.27.2.x86_64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:virtualbox-guest-tools-6.1.34-lp153.2.27.2.x86_64"
},
"product_reference": "virtualbox-guest-tools-6.1.34-lp153.2.27.2.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "virtualbox-guest-x11-6.1.34-lp153.2.27.2.x86_64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:virtualbox-guest-x11-6.1.34-lp153.2.27.2.x86_64"
},
"product_reference": "virtualbox-guest-x11-6.1.34-lp153.2.27.2.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "virtualbox-host-source-6.1.34-lp153.2.27.2.noarch as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:virtualbox-host-source-6.1.34-lp153.2.27.2.noarch"
},
"product_reference": "virtualbox-host-source-6.1.34-lp153.2.27.2.noarch",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "virtualbox-kmp-default-6.1.34_k5.3.18_150300.59.63-lp153.2.27.1.x86_64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:virtualbox-kmp-default-6.1.34_k5.3.18_150300.59.63-lp153.2.27.1.x86_64"
},
"product_reference": "virtualbox-kmp-default-6.1.34_k5.3.18_150300.59.63-lp153.2.27.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "virtualbox-kmp-preempt-6.1.34_k5.3.18_150300.59.63-lp153.2.27.1.x86_64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:virtualbox-kmp-preempt-6.1.34_k5.3.18_150300.59.63-lp153.2.27.1.x86_64"
},
"product_reference": "virtualbox-kmp-preempt-6.1.34_k5.3.18_150300.59.63-lp153.2.27.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "virtualbox-qt-6.1.34-lp153.2.27.2.x86_64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:virtualbox-qt-6.1.34-lp153.2.27.2.x86_64"
},
"product_reference": "virtualbox-qt-6.1.34-lp153.2.27.2.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "virtualbox-vnc-6.1.34-lp153.2.27.2.x86_64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:virtualbox-vnc-6.1.34-lp153.2.27.2.x86_64"
},
"product_reference": "virtualbox-vnc-6.1.34-lp153.2.27.2.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "virtualbox-websrv-6.1.34-lp153.2.27.2.x86_64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:virtualbox-websrv-6.1.34-lp153.2.27.2.x86_64"
},
"product_reference": "virtualbox-websrv-6.1.34-lp153.2.27.2.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "busybox-1.34.1-4.9.1.aarch64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:busybox-1.34.1-4.9.1.aarch64"
},
"product_reference": "busybox-1.34.1-4.9.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "busybox-1.34.1-4.9.1.ppc64le as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:busybox-1.34.1-4.9.1.ppc64le"
},
"product_reference": "busybox-1.34.1-4.9.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "busybox-1.34.1-4.9.1.s390x as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:busybox-1.34.1-4.9.1.s390x"
},
"product_reference": "busybox-1.34.1-4.9.1.s390x",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "busybox-1.34.1-4.9.1.x86_64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:busybox-1.34.1-4.9.1.x86_64"
},
"product_reference": "busybox-1.34.1-4.9.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "busybox-static-1.34.1-4.9.1.aarch64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.aarch64"
},
"product_reference": "busybox-static-1.34.1-4.9.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "busybox-static-1.34.1-4.9.1.ppc64le as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.ppc64le"
},
"product_reference": "busybox-static-1.34.1-4.9.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "busybox-static-1.34.1-4.9.1.s390x as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.s390x"
},
"product_reference": "busybox-static-1.34.1-4.9.1.s390x",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "busybox-static-1.34.1-4.9.1.x86_64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.x86_64"
},
"product_reference": "busybox-static-1.34.1-4.9.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-virtualbox-6.1.34-lp153.2.27.2.x86_64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:python3-virtualbox-6.1.34-lp153.2.27.2.x86_64"
},
"product_reference": "python3-virtualbox-6.1.34-lp153.2.27.2.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "virtualbox-6.1.34-lp153.2.27.2.x86_64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:virtualbox-6.1.34-lp153.2.27.2.x86_64"
},
"product_reference": "virtualbox-6.1.34-lp153.2.27.2.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "virtualbox-devel-6.1.34-lp153.2.27.2.x86_64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:virtualbox-devel-6.1.34-lp153.2.27.2.x86_64"
},
"product_reference": "virtualbox-devel-6.1.34-lp153.2.27.2.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "virtualbox-guest-desktop-icons-6.1.34-lp153.2.27.2.noarch as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:virtualbox-guest-desktop-icons-6.1.34-lp153.2.27.2.noarch"
},
"product_reference": "virtualbox-guest-desktop-icons-6.1.34-lp153.2.27.2.noarch",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "virtualbox-guest-source-6.1.34-lp153.2.27.2.noarch as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:virtualbox-guest-source-6.1.34-lp153.2.27.2.noarch"
},
"product_reference": "virtualbox-guest-source-6.1.34-lp153.2.27.2.noarch",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "virtualbox-guest-tools-6.1.34-lp153.2.27.2.x86_64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:virtualbox-guest-tools-6.1.34-lp153.2.27.2.x86_64"
},
"product_reference": "virtualbox-guest-tools-6.1.34-lp153.2.27.2.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "virtualbox-guest-x11-6.1.34-lp153.2.27.2.x86_64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:virtualbox-guest-x11-6.1.34-lp153.2.27.2.x86_64"
},
"product_reference": "virtualbox-guest-x11-6.1.34-lp153.2.27.2.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "virtualbox-host-source-6.1.34-lp153.2.27.2.noarch as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:virtualbox-host-source-6.1.34-lp153.2.27.2.noarch"
},
"product_reference": "virtualbox-host-source-6.1.34-lp153.2.27.2.noarch",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "virtualbox-kmp-default-6.1.34_k5.3.18_150300.59.63-lp153.2.27.1.x86_64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:virtualbox-kmp-default-6.1.34_k5.3.18_150300.59.63-lp153.2.27.1.x86_64"
},
"product_reference": "virtualbox-kmp-default-6.1.34_k5.3.18_150300.59.63-lp153.2.27.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "virtualbox-kmp-preempt-6.1.34_k5.3.18_150300.59.63-lp153.2.27.1.x86_64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:virtualbox-kmp-preempt-6.1.34_k5.3.18_150300.59.63-lp153.2.27.1.x86_64"
},
"product_reference": "virtualbox-kmp-preempt-6.1.34_k5.3.18_150300.59.63-lp153.2.27.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "virtualbox-qt-6.1.34-lp153.2.27.2.x86_64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:virtualbox-qt-6.1.34-lp153.2.27.2.x86_64"
},
"product_reference": "virtualbox-qt-6.1.34-lp153.2.27.2.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "virtualbox-vnc-6.1.34-lp153.2.27.2.x86_64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:virtualbox-vnc-6.1.34-lp153.2.27.2.x86_64"
},
"product_reference": "virtualbox-vnc-6.1.34-lp153.2.27.2.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "virtualbox-websrv-6.1.34-lp153.2.27.2.x86_64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:virtualbox-websrv-6.1.34-lp153.2.27.2.x86_64"
},
"product_reference": "virtualbox-websrv-6.1.34-lp153.2.27.2.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "busybox-1.34.1-4.9.1.aarch64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:busybox-1.34.1-4.9.1.aarch64"
},
"product_reference": "busybox-1.34.1-4.9.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "busybox-1.34.1-4.9.1.ppc64le as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:busybox-1.34.1-4.9.1.ppc64le"
},
"product_reference": "busybox-1.34.1-4.9.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "busybox-1.34.1-4.9.1.s390x as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:busybox-1.34.1-4.9.1.s390x"
},
"product_reference": "busybox-1.34.1-4.9.1.s390x",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "busybox-1.34.1-4.9.1.x86_64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:busybox-1.34.1-4.9.1.x86_64"
},
"product_reference": "busybox-1.34.1-4.9.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "busybox-static-1.34.1-4.9.1.aarch64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.aarch64"
},
"product_reference": "busybox-static-1.34.1-4.9.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "busybox-static-1.34.1-4.9.1.ppc64le as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.ppc64le"
},
"product_reference": "busybox-static-1.34.1-4.9.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "busybox-static-1.34.1-4.9.1.s390x as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.s390x"
},
"product_reference": "busybox-static-1.34.1-4.9.1.s390x",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "busybox-static-1.34.1-4.9.1.x86_64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.x86_64"
},
"product_reference": "busybox-static-1.34.1-4.9.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.3"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2011-5325",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2011-5325"
}
],
"notes": [
{
"category": "general",
"text": "Directory traversal vulnerability in the BusyBox implementation of tar before 1.22.0 v5 allows remote attackers to point to files outside the current working directory via a symlink.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.3:busybox-1.34.1-4.9.1.aarch64",
"openSUSE Leap 15.3:busybox-1.34.1-4.9.1.ppc64le",
"openSUSE Leap 15.3:busybox-1.34.1-4.9.1.s390x",
"openSUSE Leap 15.3:busybox-1.34.1-4.9.1.x86_64",
"openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.aarch64",
"openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.ppc64le",
"openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.s390x",
"openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.x86_64",
"openSUSE Leap 15.3:python3-virtualbox-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-devel-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-guest-desktop-icons-6.1.34-lp153.2.27.2.noarch",
"openSUSE Leap 15.3:virtualbox-guest-source-6.1.34-lp153.2.27.2.noarch",
"openSUSE Leap 15.3:virtualbox-guest-tools-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-guest-x11-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-host-source-6.1.34-lp153.2.27.2.noarch",
"openSUSE Leap 15.3:virtualbox-kmp-default-6.1.34_k5.3.18_150300.59.63-lp153.2.27.1.x86_64",
"openSUSE Leap 15.3:virtualbox-kmp-preempt-6.1.34_k5.3.18_150300.59.63-lp153.2.27.1.x86_64",
"openSUSE Leap 15.3:virtualbox-qt-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-vnc-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-websrv-6.1.34-lp153.2.27.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2011-5325",
"url": "https://www.suse.com/security/cve/CVE-2011-5325"
},
{
"category": "external",
"summary": "SUSE Bug 951562 for CVE-2011-5325",
"url": "https://bugzilla.suse.com/951562"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.3:busybox-1.34.1-4.9.1.aarch64",
"openSUSE Leap 15.3:busybox-1.34.1-4.9.1.ppc64le",
"openSUSE Leap 15.3:busybox-1.34.1-4.9.1.s390x",
"openSUSE Leap 15.3:busybox-1.34.1-4.9.1.x86_64",
"openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.aarch64",
"openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.ppc64le",
"openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.s390x",
"openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.x86_64",
"openSUSE Leap 15.3:python3-virtualbox-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-devel-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-guest-desktop-icons-6.1.34-lp153.2.27.2.noarch",
"openSUSE Leap 15.3:virtualbox-guest-source-6.1.34-lp153.2.27.2.noarch",
"openSUSE Leap 15.3:virtualbox-guest-tools-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-guest-x11-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-host-source-6.1.34-lp153.2.27.2.noarch",
"openSUSE Leap 15.3:virtualbox-kmp-default-6.1.34_k5.3.18_150300.59.63-lp153.2.27.1.x86_64",
"openSUSE Leap 15.3:virtualbox-kmp-preempt-6.1.34_k5.3.18_150300.59.63-lp153.2.27.1.x86_64",
"openSUSE Leap 15.3:virtualbox-qt-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-vnc-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-websrv-6.1.34-lp153.2.27.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.3:busybox-1.34.1-4.9.1.aarch64",
"openSUSE Leap 15.3:busybox-1.34.1-4.9.1.ppc64le",
"openSUSE Leap 15.3:busybox-1.34.1-4.9.1.s390x",
"openSUSE Leap 15.3:busybox-1.34.1-4.9.1.x86_64",
"openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.aarch64",
"openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.ppc64le",
"openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.s390x",
"openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.x86_64",
"openSUSE Leap 15.3:python3-virtualbox-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-devel-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-guest-desktop-icons-6.1.34-lp153.2.27.2.noarch",
"openSUSE Leap 15.3:virtualbox-guest-source-6.1.34-lp153.2.27.2.noarch",
"openSUSE Leap 15.3:virtualbox-guest-tools-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-guest-x11-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-host-source-6.1.34-lp153.2.27.2.noarch",
"openSUSE Leap 15.3:virtualbox-kmp-default-6.1.34_k5.3.18_150300.59.63-lp153.2.27.1.x86_64",
"openSUSE Leap 15.3:virtualbox-kmp-preempt-6.1.34_k5.3.18_150300.59.63-lp153.2.27.1.x86_64",
"openSUSE Leap 15.3:virtualbox-qt-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-vnc-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-websrv-6.1.34-lp153.2.27.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-01-20T09:04:27Z",
"details": "moderate"
}
],
"title": "CVE-2011-5325"
},
{
"cve": "CVE-2015-9261",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2015-9261"
}
],
"notes": [
{
"category": "general",
"text": "huft_build in archival/libarchive/decompress_gunzip.c in BusyBox before 1.27.2 misuses a pointer, causing segfaults and an application crash during an unzip operation on a specially crafted ZIP file.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.3:busybox-1.34.1-4.9.1.aarch64",
"openSUSE Leap 15.3:busybox-1.34.1-4.9.1.ppc64le",
"openSUSE Leap 15.3:busybox-1.34.1-4.9.1.s390x",
"openSUSE Leap 15.3:busybox-1.34.1-4.9.1.x86_64",
"openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.aarch64",
"openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.ppc64le",
"openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.s390x",
"openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.x86_64",
"openSUSE Leap 15.3:python3-virtualbox-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-devel-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-guest-desktop-icons-6.1.34-lp153.2.27.2.noarch",
"openSUSE Leap 15.3:virtualbox-guest-source-6.1.34-lp153.2.27.2.noarch",
"openSUSE Leap 15.3:virtualbox-guest-tools-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-guest-x11-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-host-source-6.1.34-lp153.2.27.2.noarch",
"openSUSE Leap 15.3:virtualbox-kmp-default-6.1.34_k5.3.18_150300.59.63-lp153.2.27.1.x86_64",
"openSUSE Leap 15.3:virtualbox-kmp-preempt-6.1.34_k5.3.18_150300.59.63-lp153.2.27.1.x86_64",
"openSUSE Leap 15.3:virtualbox-qt-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-vnc-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-websrv-6.1.34-lp153.2.27.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2015-9261",
"url": "https://www.suse.com/security/cve/CVE-2015-9261"
},
{
"category": "external",
"summary": "SUSE Bug 1102912 for CVE-2015-9261",
"url": "https://bugzilla.suse.com/1102912"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.3:busybox-1.34.1-4.9.1.aarch64",
"openSUSE Leap 15.3:busybox-1.34.1-4.9.1.ppc64le",
"openSUSE Leap 15.3:busybox-1.34.1-4.9.1.s390x",
"openSUSE Leap 15.3:busybox-1.34.1-4.9.1.x86_64",
"openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.aarch64",
"openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.ppc64le",
"openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.s390x",
"openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.x86_64",
"openSUSE Leap 15.3:python3-virtualbox-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-devel-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-guest-desktop-icons-6.1.34-lp153.2.27.2.noarch",
"openSUSE Leap 15.3:virtualbox-guest-source-6.1.34-lp153.2.27.2.noarch",
"openSUSE Leap 15.3:virtualbox-guest-tools-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-guest-x11-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-host-source-6.1.34-lp153.2.27.2.noarch",
"openSUSE Leap 15.3:virtualbox-kmp-default-6.1.34_k5.3.18_150300.59.63-lp153.2.27.1.x86_64",
"openSUSE Leap 15.3:virtualbox-kmp-preempt-6.1.34_k5.3.18_150300.59.63-lp153.2.27.1.x86_64",
"openSUSE Leap 15.3:virtualbox-qt-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-vnc-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-websrv-6.1.34-lp153.2.27.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"openSUSE Leap 15.3:busybox-1.34.1-4.9.1.aarch64",
"openSUSE Leap 15.3:busybox-1.34.1-4.9.1.ppc64le",
"openSUSE Leap 15.3:busybox-1.34.1-4.9.1.s390x",
"openSUSE Leap 15.3:busybox-1.34.1-4.9.1.x86_64",
"openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.aarch64",
"openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.ppc64le",
"openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.s390x",
"openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.x86_64",
"openSUSE Leap 15.3:python3-virtualbox-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-devel-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-guest-desktop-icons-6.1.34-lp153.2.27.2.noarch",
"openSUSE Leap 15.3:virtualbox-guest-source-6.1.34-lp153.2.27.2.noarch",
"openSUSE Leap 15.3:virtualbox-guest-tools-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-guest-x11-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-host-source-6.1.34-lp153.2.27.2.noarch",
"openSUSE Leap 15.3:virtualbox-kmp-default-6.1.34_k5.3.18_150300.59.63-lp153.2.27.1.x86_64",
"openSUSE Leap 15.3:virtualbox-kmp-preempt-6.1.34_k5.3.18_150300.59.63-lp153.2.27.1.x86_64",
"openSUSE Leap 15.3:virtualbox-qt-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-vnc-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-websrv-6.1.34-lp153.2.27.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-01-20T09:04:27Z",
"details": "moderate"
}
],
"title": "CVE-2015-9261"
},
{
"cve": "CVE-2016-2147",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2016-2147"
}
],
"notes": [
{
"category": "general",
"text": "Integer overflow in the DHCP client (udhcpc) in BusyBox before 1.25.0 allows remote attackers to cause a denial of service (crash) via a malformed RFC1035-encoded domain name, which triggers an out-of-bounds heap write.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.3:busybox-1.34.1-4.9.1.aarch64",
"openSUSE Leap 15.3:busybox-1.34.1-4.9.1.ppc64le",
"openSUSE Leap 15.3:busybox-1.34.1-4.9.1.s390x",
"openSUSE Leap 15.3:busybox-1.34.1-4.9.1.x86_64",
"openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.aarch64",
"openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.ppc64le",
"openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.s390x",
"openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.x86_64",
"openSUSE Leap 15.3:python3-virtualbox-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-devel-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-guest-desktop-icons-6.1.34-lp153.2.27.2.noarch",
"openSUSE Leap 15.3:virtualbox-guest-source-6.1.34-lp153.2.27.2.noarch",
"openSUSE Leap 15.3:virtualbox-guest-tools-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-guest-x11-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-host-source-6.1.34-lp153.2.27.2.noarch",
"openSUSE Leap 15.3:virtualbox-kmp-default-6.1.34_k5.3.18_150300.59.63-lp153.2.27.1.x86_64",
"openSUSE Leap 15.3:virtualbox-kmp-preempt-6.1.34_k5.3.18_150300.59.63-lp153.2.27.1.x86_64",
"openSUSE Leap 15.3:virtualbox-qt-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-vnc-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-websrv-6.1.34-lp153.2.27.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2016-2147",
"url": "https://www.suse.com/security/cve/CVE-2016-2147"
},
{
"category": "external",
"summary": "SUSE Bug 970663 for CVE-2016-2147",
"url": "https://bugzilla.suse.com/970663"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.3:busybox-1.34.1-4.9.1.aarch64",
"openSUSE Leap 15.3:busybox-1.34.1-4.9.1.ppc64le",
"openSUSE Leap 15.3:busybox-1.34.1-4.9.1.s390x",
"openSUSE Leap 15.3:busybox-1.34.1-4.9.1.x86_64",
"openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.aarch64",
"openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.ppc64le",
"openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.s390x",
"openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.x86_64",
"openSUSE Leap 15.3:python3-virtualbox-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-devel-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-guest-desktop-icons-6.1.34-lp153.2.27.2.noarch",
"openSUSE Leap 15.3:virtualbox-guest-source-6.1.34-lp153.2.27.2.noarch",
"openSUSE Leap 15.3:virtualbox-guest-tools-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-guest-x11-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-host-source-6.1.34-lp153.2.27.2.noarch",
"openSUSE Leap 15.3:virtualbox-kmp-default-6.1.34_k5.3.18_150300.59.63-lp153.2.27.1.x86_64",
"openSUSE Leap 15.3:virtualbox-kmp-preempt-6.1.34_k5.3.18_150300.59.63-lp153.2.27.1.x86_64",
"openSUSE Leap 15.3:virtualbox-qt-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-vnc-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-websrv-6.1.34-lp153.2.27.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.3:busybox-1.34.1-4.9.1.aarch64",
"openSUSE Leap 15.3:busybox-1.34.1-4.9.1.ppc64le",
"openSUSE Leap 15.3:busybox-1.34.1-4.9.1.s390x",
"openSUSE Leap 15.3:busybox-1.34.1-4.9.1.x86_64",
"openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.aarch64",
"openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.ppc64le",
"openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.s390x",
"openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.x86_64",
"openSUSE Leap 15.3:python3-virtualbox-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-devel-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-guest-desktop-icons-6.1.34-lp153.2.27.2.noarch",
"openSUSE Leap 15.3:virtualbox-guest-source-6.1.34-lp153.2.27.2.noarch",
"openSUSE Leap 15.3:virtualbox-guest-tools-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-guest-x11-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-host-source-6.1.34-lp153.2.27.2.noarch",
"openSUSE Leap 15.3:virtualbox-kmp-default-6.1.34_k5.3.18_150300.59.63-lp153.2.27.1.x86_64",
"openSUSE Leap 15.3:virtualbox-kmp-preempt-6.1.34_k5.3.18_150300.59.63-lp153.2.27.1.x86_64",
"openSUSE Leap 15.3:virtualbox-qt-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-vnc-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-websrv-6.1.34-lp153.2.27.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-01-20T09:04:27Z",
"details": "important"
}
],
"title": "CVE-2016-2147"
},
{
"cve": "CVE-2016-2148",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2016-2148"
}
],
"notes": [
{
"category": "general",
"text": "Heap-based buffer overflow in the DHCP client (udhcpc) in BusyBox before 1.25.0 allows remote attackers to have unspecified impact via vectors involving OPTION_6RD parsing.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.3:busybox-1.34.1-4.9.1.aarch64",
"openSUSE Leap 15.3:busybox-1.34.1-4.9.1.ppc64le",
"openSUSE Leap 15.3:busybox-1.34.1-4.9.1.s390x",
"openSUSE Leap 15.3:busybox-1.34.1-4.9.1.x86_64",
"openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.aarch64",
"openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.ppc64le",
"openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.s390x",
"openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.x86_64",
"openSUSE Leap 15.3:python3-virtualbox-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-devel-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-guest-desktop-icons-6.1.34-lp153.2.27.2.noarch",
"openSUSE Leap 15.3:virtualbox-guest-source-6.1.34-lp153.2.27.2.noarch",
"openSUSE Leap 15.3:virtualbox-guest-tools-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-guest-x11-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-host-source-6.1.34-lp153.2.27.2.noarch",
"openSUSE Leap 15.3:virtualbox-kmp-default-6.1.34_k5.3.18_150300.59.63-lp153.2.27.1.x86_64",
"openSUSE Leap 15.3:virtualbox-kmp-preempt-6.1.34_k5.3.18_150300.59.63-lp153.2.27.1.x86_64",
"openSUSE Leap 15.3:virtualbox-qt-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-vnc-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-websrv-6.1.34-lp153.2.27.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2016-2148",
"url": "https://www.suse.com/security/cve/CVE-2016-2148"
},
{
"category": "external",
"summary": "SUSE Bug 970662 for CVE-2016-2148",
"url": "https://bugzilla.suse.com/970662"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.3:busybox-1.34.1-4.9.1.aarch64",
"openSUSE Leap 15.3:busybox-1.34.1-4.9.1.ppc64le",
"openSUSE Leap 15.3:busybox-1.34.1-4.9.1.s390x",
"openSUSE Leap 15.3:busybox-1.34.1-4.9.1.x86_64",
"openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.aarch64",
"openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.ppc64le",
"openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.s390x",
"openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.x86_64",
"openSUSE Leap 15.3:python3-virtualbox-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-devel-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-guest-desktop-icons-6.1.34-lp153.2.27.2.noarch",
"openSUSE Leap 15.3:virtualbox-guest-source-6.1.34-lp153.2.27.2.noarch",
"openSUSE Leap 15.3:virtualbox-guest-tools-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-guest-x11-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-host-source-6.1.34-lp153.2.27.2.noarch",
"openSUSE Leap 15.3:virtualbox-kmp-default-6.1.34_k5.3.18_150300.59.63-lp153.2.27.1.x86_64",
"openSUSE Leap 15.3:virtualbox-kmp-preempt-6.1.34_k5.3.18_150300.59.63-lp153.2.27.1.x86_64",
"openSUSE Leap 15.3:virtualbox-qt-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-vnc-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-websrv-6.1.34-lp153.2.27.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.3:busybox-1.34.1-4.9.1.aarch64",
"openSUSE Leap 15.3:busybox-1.34.1-4.9.1.ppc64le",
"openSUSE Leap 15.3:busybox-1.34.1-4.9.1.s390x",
"openSUSE Leap 15.3:busybox-1.34.1-4.9.1.x86_64",
"openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.aarch64",
"openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.ppc64le",
"openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.s390x",
"openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.x86_64",
"openSUSE Leap 15.3:python3-virtualbox-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-devel-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-guest-desktop-icons-6.1.34-lp153.2.27.2.noarch",
"openSUSE Leap 15.3:virtualbox-guest-source-6.1.34-lp153.2.27.2.noarch",
"openSUSE Leap 15.3:virtualbox-guest-tools-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-guest-x11-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-host-source-6.1.34-lp153.2.27.2.noarch",
"openSUSE Leap 15.3:virtualbox-kmp-default-6.1.34_k5.3.18_150300.59.63-lp153.2.27.1.x86_64",
"openSUSE Leap 15.3:virtualbox-kmp-preempt-6.1.34_k5.3.18_150300.59.63-lp153.2.27.1.x86_64",
"openSUSE Leap 15.3:virtualbox-qt-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-vnc-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-websrv-6.1.34-lp153.2.27.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-01-20T09:04:27Z",
"details": "moderate"
}
],
"title": "CVE-2016-2148"
},
{
"cve": "CVE-2016-6301",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2016-6301"
}
],
"notes": [
{
"category": "general",
"text": "The recv_and_process_client_pkt function in networking/ntpd.c in busybox allows remote attackers to cause a denial of service (CPU and bandwidth consumption) via a forged NTP packet, which triggers a communication loop.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.3:busybox-1.34.1-4.9.1.aarch64",
"openSUSE Leap 15.3:busybox-1.34.1-4.9.1.ppc64le",
"openSUSE Leap 15.3:busybox-1.34.1-4.9.1.s390x",
"openSUSE Leap 15.3:busybox-1.34.1-4.9.1.x86_64",
"openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.aarch64",
"openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.ppc64le",
"openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.s390x",
"openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.x86_64",
"openSUSE Leap 15.3:python3-virtualbox-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-devel-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-guest-desktop-icons-6.1.34-lp153.2.27.2.noarch",
"openSUSE Leap 15.3:virtualbox-guest-source-6.1.34-lp153.2.27.2.noarch",
"openSUSE Leap 15.3:virtualbox-guest-tools-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-guest-x11-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-host-source-6.1.34-lp153.2.27.2.noarch",
"openSUSE Leap 15.3:virtualbox-kmp-default-6.1.34_k5.3.18_150300.59.63-lp153.2.27.1.x86_64",
"openSUSE Leap 15.3:virtualbox-kmp-preempt-6.1.34_k5.3.18_150300.59.63-lp153.2.27.1.x86_64",
"openSUSE Leap 15.3:virtualbox-qt-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-vnc-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-websrv-6.1.34-lp153.2.27.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2016-6301",
"url": "https://www.suse.com/security/cve/CVE-2016-6301"
},
{
"category": "external",
"summary": "SUSE Bug 991940 for CVE-2016-6301",
"url": "https://bugzilla.suse.com/991940"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.3:busybox-1.34.1-4.9.1.aarch64",
"openSUSE Leap 15.3:busybox-1.34.1-4.9.1.ppc64le",
"openSUSE Leap 15.3:busybox-1.34.1-4.9.1.s390x",
"openSUSE Leap 15.3:busybox-1.34.1-4.9.1.x86_64",
"openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.aarch64",
"openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.ppc64le",
"openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.s390x",
"openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.x86_64",
"openSUSE Leap 15.3:python3-virtualbox-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-devel-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-guest-desktop-icons-6.1.34-lp153.2.27.2.noarch",
"openSUSE Leap 15.3:virtualbox-guest-source-6.1.34-lp153.2.27.2.noarch",
"openSUSE Leap 15.3:virtualbox-guest-tools-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-guest-x11-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-host-source-6.1.34-lp153.2.27.2.noarch",
"openSUSE Leap 15.3:virtualbox-kmp-default-6.1.34_k5.3.18_150300.59.63-lp153.2.27.1.x86_64",
"openSUSE Leap 15.3:virtualbox-kmp-preempt-6.1.34_k5.3.18_150300.59.63-lp153.2.27.1.x86_64",
"openSUSE Leap 15.3:virtualbox-qt-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-vnc-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-websrv-6.1.34-lp153.2.27.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"openSUSE Leap 15.3:busybox-1.34.1-4.9.1.aarch64",
"openSUSE Leap 15.3:busybox-1.34.1-4.9.1.ppc64le",
"openSUSE Leap 15.3:busybox-1.34.1-4.9.1.s390x",
"openSUSE Leap 15.3:busybox-1.34.1-4.9.1.x86_64",
"openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.aarch64",
"openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.ppc64le",
"openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.s390x",
"openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.x86_64",
"openSUSE Leap 15.3:python3-virtualbox-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-devel-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-guest-desktop-icons-6.1.34-lp153.2.27.2.noarch",
"openSUSE Leap 15.3:virtualbox-guest-source-6.1.34-lp153.2.27.2.noarch",
"openSUSE Leap 15.3:virtualbox-guest-tools-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-guest-x11-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-host-source-6.1.34-lp153.2.27.2.noarch",
"openSUSE Leap 15.3:virtualbox-kmp-default-6.1.34_k5.3.18_150300.59.63-lp153.2.27.1.x86_64",
"openSUSE Leap 15.3:virtualbox-kmp-preempt-6.1.34_k5.3.18_150300.59.63-lp153.2.27.1.x86_64",
"openSUSE Leap 15.3:virtualbox-qt-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-vnc-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-websrv-6.1.34-lp153.2.27.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-01-20T09:04:27Z",
"details": "moderate"
}
],
"title": "CVE-2016-6301"
},
{
"cve": "CVE-2017-15873",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-15873"
}
],
"notes": [
{
"category": "general",
"text": "The get_next_block function in archival/libarchive/decompress_bunzip2.c in BusyBox 1.27.2 has an Integer Overflow that may lead to a write access violation.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.3:busybox-1.34.1-4.9.1.aarch64",
"openSUSE Leap 15.3:busybox-1.34.1-4.9.1.ppc64le",
"openSUSE Leap 15.3:busybox-1.34.1-4.9.1.s390x",
"openSUSE Leap 15.3:busybox-1.34.1-4.9.1.x86_64",
"openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.aarch64",
"openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.ppc64le",
"openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.s390x",
"openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.x86_64",
"openSUSE Leap 15.3:python3-virtualbox-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-devel-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-guest-desktop-icons-6.1.34-lp153.2.27.2.noarch",
"openSUSE Leap 15.3:virtualbox-guest-source-6.1.34-lp153.2.27.2.noarch",
"openSUSE Leap 15.3:virtualbox-guest-tools-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-guest-x11-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-host-source-6.1.34-lp153.2.27.2.noarch",
"openSUSE Leap 15.3:virtualbox-kmp-default-6.1.34_k5.3.18_150300.59.63-lp153.2.27.1.x86_64",
"openSUSE Leap 15.3:virtualbox-kmp-preempt-6.1.34_k5.3.18_150300.59.63-lp153.2.27.1.x86_64",
"openSUSE Leap 15.3:virtualbox-qt-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-vnc-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-websrv-6.1.34-lp153.2.27.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-15873",
"url": "https://www.suse.com/security/cve/CVE-2017-15873"
},
{
"category": "external",
"summary": "SUSE Bug 1064976 for CVE-2017-15873",
"url": "https://bugzilla.suse.com/1064976"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.3:busybox-1.34.1-4.9.1.aarch64",
"openSUSE Leap 15.3:busybox-1.34.1-4.9.1.ppc64le",
"openSUSE Leap 15.3:busybox-1.34.1-4.9.1.s390x",
"openSUSE Leap 15.3:busybox-1.34.1-4.9.1.x86_64",
"openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.aarch64",
"openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.ppc64le",
"openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.s390x",
"openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.x86_64",
"openSUSE Leap 15.3:python3-virtualbox-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-devel-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-guest-desktop-icons-6.1.34-lp153.2.27.2.noarch",
"openSUSE Leap 15.3:virtualbox-guest-source-6.1.34-lp153.2.27.2.noarch",
"openSUSE Leap 15.3:virtualbox-guest-tools-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-guest-x11-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-host-source-6.1.34-lp153.2.27.2.noarch",
"openSUSE Leap 15.3:virtualbox-kmp-default-6.1.34_k5.3.18_150300.59.63-lp153.2.27.1.x86_64",
"openSUSE Leap 15.3:virtualbox-kmp-preempt-6.1.34_k5.3.18_150300.59.63-lp153.2.27.1.x86_64",
"openSUSE Leap 15.3:virtualbox-qt-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-vnc-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-websrv-6.1.34-lp153.2.27.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"openSUSE Leap 15.3:busybox-1.34.1-4.9.1.aarch64",
"openSUSE Leap 15.3:busybox-1.34.1-4.9.1.ppc64le",
"openSUSE Leap 15.3:busybox-1.34.1-4.9.1.s390x",
"openSUSE Leap 15.3:busybox-1.34.1-4.9.1.x86_64",
"openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.aarch64",
"openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.ppc64le",
"openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.s390x",
"openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.x86_64",
"openSUSE Leap 15.3:python3-virtualbox-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-devel-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-guest-desktop-icons-6.1.34-lp153.2.27.2.noarch",
"openSUSE Leap 15.3:virtualbox-guest-source-6.1.34-lp153.2.27.2.noarch",
"openSUSE Leap 15.3:virtualbox-guest-tools-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-guest-x11-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-host-source-6.1.34-lp153.2.27.2.noarch",
"openSUSE Leap 15.3:virtualbox-kmp-default-6.1.34_k5.3.18_150300.59.63-lp153.2.27.1.x86_64",
"openSUSE Leap 15.3:virtualbox-kmp-preempt-6.1.34_k5.3.18_150300.59.63-lp153.2.27.1.x86_64",
"openSUSE Leap 15.3:virtualbox-qt-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-vnc-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-websrv-6.1.34-lp153.2.27.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-01-20T09:04:27Z",
"details": "moderate"
}
],
"title": "CVE-2017-15873"
},
{
"cve": "CVE-2017-15874",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-15874"
}
],
"notes": [
{
"category": "general",
"text": "archival/libarchive/decompress_unlzma.c in BusyBox 1.27.2 has an Integer Underflow that leads to a read access violation.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.3:busybox-1.34.1-4.9.1.aarch64",
"openSUSE Leap 15.3:busybox-1.34.1-4.9.1.ppc64le",
"openSUSE Leap 15.3:busybox-1.34.1-4.9.1.s390x",
"openSUSE Leap 15.3:busybox-1.34.1-4.9.1.x86_64",
"openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.aarch64",
"openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.ppc64le",
"openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.s390x",
"openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.x86_64",
"openSUSE Leap 15.3:python3-virtualbox-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-devel-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-guest-desktop-icons-6.1.34-lp153.2.27.2.noarch",
"openSUSE Leap 15.3:virtualbox-guest-source-6.1.34-lp153.2.27.2.noarch",
"openSUSE Leap 15.3:virtualbox-guest-tools-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-guest-x11-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-host-source-6.1.34-lp153.2.27.2.noarch",
"openSUSE Leap 15.3:virtualbox-kmp-default-6.1.34_k5.3.18_150300.59.63-lp153.2.27.1.x86_64",
"openSUSE Leap 15.3:virtualbox-kmp-preempt-6.1.34_k5.3.18_150300.59.63-lp153.2.27.1.x86_64",
"openSUSE Leap 15.3:virtualbox-qt-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-vnc-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-websrv-6.1.34-lp153.2.27.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-15874",
"url": "https://www.suse.com/security/cve/CVE-2017-15874"
},
{
"category": "external",
"summary": "SUSE Bug 1064978 for CVE-2017-15874",
"url": "https://bugzilla.suse.com/1064978"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.3:busybox-1.34.1-4.9.1.aarch64",
"openSUSE Leap 15.3:busybox-1.34.1-4.9.1.ppc64le",
"openSUSE Leap 15.3:busybox-1.34.1-4.9.1.s390x",
"openSUSE Leap 15.3:busybox-1.34.1-4.9.1.x86_64",
"openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.aarch64",
"openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.ppc64le",
"openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.s390x",
"openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.x86_64",
"openSUSE Leap 15.3:python3-virtualbox-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-devel-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-guest-desktop-icons-6.1.34-lp153.2.27.2.noarch",
"openSUSE Leap 15.3:virtualbox-guest-source-6.1.34-lp153.2.27.2.noarch",
"openSUSE Leap 15.3:virtualbox-guest-tools-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-guest-x11-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-host-source-6.1.34-lp153.2.27.2.noarch",
"openSUSE Leap 15.3:virtualbox-kmp-default-6.1.34_k5.3.18_150300.59.63-lp153.2.27.1.x86_64",
"openSUSE Leap 15.3:virtualbox-kmp-preempt-6.1.34_k5.3.18_150300.59.63-lp153.2.27.1.x86_64",
"openSUSE Leap 15.3:virtualbox-qt-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-vnc-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-websrv-6.1.34-lp153.2.27.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.3,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L",
"version": "3.0"
},
"products": [
"openSUSE Leap 15.3:busybox-1.34.1-4.9.1.aarch64",
"openSUSE Leap 15.3:busybox-1.34.1-4.9.1.ppc64le",
"openSUSE Leap 15.3:busybox-1.34.1-4.9.1.s390x",
"openSUSE Leap 15.3:busybox-1.34.1-4.9.1.x86_64",
"openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.aarch64",
"openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.ppc64le",
"openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.s390x",
"openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.x86_64",
"openSUSE Leap 15.3:python3-virtualbox-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-devel-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-guest-desktop-icons-6.1.34-lp153.2.27.2.noarch",
"openSUSE Leap 15.3:virtualbox-guest-source-6.1.34-lp153.2.27.2.noarch",
"openSUSE Leap 15.3:virtualbox-guest-tools-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-guest-x11-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-host-source-6.1.34-lp153.2.27.2.noarch",
"openSUSE Leap 15.3:virtualbox-kmp-default-6.1.34_k5.3.18_150300.59.63-lp153.2.27.1.x86_64",
"openSUSE Leap 15.3:virtualbox-kmp-preempt-6.1.34_k5.3.18_150300.59.63-lp153.2.27.1.x86_64",
"openSUSE Leap 15.3:virtualbox-qt-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-vnc-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-websrv-6.1.34-lp153.2.27.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-01-20T09:04:27Z",
"details": "low"
}
],
"title": "CVE-2017-15874"
},
{
"cve": "CVE-2017-16544",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-16544"
}
],
"notes": [
{
"category": "general",
"text": "In the add_match function in libbb/lineedit.c in BusyBox through 1.27.2, the tab autocomplete feature of the shell, used to get a list of filenames in a directory, does not sanitize filenames and results in executing any escape sequence in the terminal. This could potentially result in code execution, arbitrary file writes, or other attacks.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.3:busybox-1.34.1-4.9.1.aarch64",
"openSUSE Leap 15.3:busybox-1.34.1-4.9.1.ppc64le",
"openSUSE Leap 15.3:busybox-1.34.1-4.9.1.s390x",
"openSUSE Leap 15.3:busybox-1.34.1-4.9.1.x86_64",
"openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.aarch64",
"openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.ppc64le",
"openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.s390x",
"openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.x86_64",
"openSUSE Leap 15.3:python3-virtualbox-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-devel-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-guest-desktop-icons-6.1.34-lp153.2.27.2.noarch",
"openSUSE Leap 15.3:virtualbox-guest-source-6.1.34-lp153.2.27.2.noarch",
"openSUSE Leap 15.3:virtualbox-guest-tools-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-guest-x11-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-host-source-6.1.34-lp153.2.27.2.noarch",
"openSUSE Leap 15.3:virtualbox-kmp-default-6.1.34_k5.3.18_150300.59.63-lp153.2.27.1.x86_64",
"openSUSE Leap 15.3:virtualbox-kmp-preempt-6.1.34_k5.3.18_150300.59.63-lp153.2.27.1.x86_64",
"openSUSE Leap 15.3:virtualbox-qt-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-vnc-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-websrv-6.1.34-lp153.2.27.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-16544",
"url": "https://www.suse.com/security/cve/CVE-2017-16544"
},
{
"category": "external",
"summary": "SUSE Bug 1069412 for CVE-2017-16544",
"url": "https://bugzilla.suse.com/1069412"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.3:busybox-1.34.1-4.9.1.aarch64",
"openSUSE Leap 15.3:busybox-1.34.1-4.9.1.ppc64le",
"openSUSE Leap 15.3:busybox-1.34.1-4.9.1.s390x",
"openSUSE Leap 15.3:busybox-1.34.1-4.9.1.x86_64",
"openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.aarch64",
"openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.ppc64le",
"openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.s390x",
"openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.x86_64",
"openSUSE Leap 15.3:python3-virtualbox-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-devel-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-guest-desktop-icons-6.1.34-lp153.2.27.2.noarch",
"openSUSE Leap 15.3:virtualbox-guest-source-6.1.34-lp153.2.27.2.noarch",
"openSUSE Leap 15.3:virtualbox-guest-tools-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-guest-x11-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-host-source-6.1.34-lp153.2.27.2.noarch",
"openSUSE Leap 15.3:virtualbox-kmp-default-6.1.34_k5.3.18_150300.59.63-lp153.2.27.1.x86_64",
"openSUSE Leap 15.3:virtualbox-kmp-preempt-6.1.34_k5.3.18_150300.59.63-lp153.2.27.1.x86_64",
"openSUSE Leap 15.3:virtualbox-qt-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-vnc-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-websrv-6.1.34-lp153.2.27.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"openSUSE Leap 15.3:busybox-1.34.1-4.9.1.aarch64",
"openSUSE Leap 15.3:busybox-1.34.1-4.9.1.ppc64le",
"openSUSE Leap 15.3:busybox-1.34.1-4.9.1.s390x",
"openSUSE Leap 15.3:busybox-1.34.1-4.9.1.x86_64",
"openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.aarch64",
"openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.ppc64le",
"openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.s390x",
"openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.x86_64",
"openSUSE Leap 15.3:python3-virtualbox-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-devel-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-guest-desktop-icons-6.1.34-lp153.2.27.2.noarch",
"openSUSE Leap 15.3:virtualbox-guest-source-6.1.34-lp153.2.27.2.noarch",
"openSUSE Leap 15.3:virtualbox-guest-tools-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-guest-x11-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-host-source-6.1.34-lp153.2.27.2.noarch",
"openSUSE Leap 15.3:virtualbox-kmp-default-6.1.34_k5.3.18_150300.59.63-lp153.2.27.1.x86_64",
"openSUSE Leap 15.3:virtualbox-kmp-preempt-6.1.34_k5.3.18_150300.59.63-lp153.2.27.1.x86_64",
"openSUSE Leap 15.3:virtualbox-qt-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-vnc-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-websrv-6.1.34-lp153.2.27.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-01-20T09:04:27Z",
"details": "important"
}
],
"title": "CVE-2017-16544"
},
{
"cve": "CVE-2018-1000500",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2018-1000500"
}
],
"notes": [
{
"category": "general",
"text": "Busybox contains a Missing SSL certificate validation vulnerability in The \"busybox wget\" applet that can result in arbitrary code execution. This attack appear to be exploitable via Simply download any file over HTTPS using \"busybox wget https://compromised-domain.com/important-file\".",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.3:busybox-1.34.1-4.9.1.aarch64",
"openSUSE Leap 15.3:busybox-1.34.1-4.9.1.ppc64le",
"openSUSE Leap 15.3:busybox-1.34.1-4.9.1.s390x",
"openSUSE Leap 15.3:busybox-1.34.1-4.9.1.x86_64",
"openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.aarch64",
"openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.ppc64le",
"openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.s390x",
"openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.x86_64",
"openSUSE Leap 15.3:python3-virtualbox-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-devel-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-guest-desktop-icons-6.1.34-lp153.2.27.2.noarch",
"openSUSE Leap 15.3:virtualbox-guest-source-6.1.34-lp153.2.27.2.noarch",
"openSUSE Leap 15.3:virtualbox-guest-tools-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-guest-x11-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-host-source-6.1.34-lp153.2.27.2.noarch",
"openSUSE Leap 15.3:virtualbox-kmp-default-6.1.34_k5.3.18_150300.59.63-lp153.2.27.1.x86_64",
"openSUSE Leap 15.3:virtualbox-kmp-preempt-6.1.34_k5.3.18_150300.59.63-lp153.2.27.1.x86_64",
"openSUSE Leap 15.3:virtualbox-qt-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-vnc-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-websrv-6.1.34-lp153.2.27.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2018-1000500",
"url": "https://www.suse.com/security/cve/CVE-2018-1000500"
},
{
"category": "external",
"summary": "SUSE Bug 1099263 for CVE-2018-1000500",
"url": "https://bugzilla.suse.com/1099263"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.3:busybox-1.34.1-4.9.1.aarch64",
"openSUSE Leap 15.3:busybox-1.34.1-4.9.1.ppc64le",
"openSUSE Leap 15.3:busybox-1.34.1-4.9.1.s390x",
"openSUSE Leap 15.3:busybox-1.34.1-4.9.1.x86_64",
"openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.aarch64",
"openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.ppc64le",
"openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.s390x",
"openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.x86_64",
"openSUSE Leap 15.3:python3-virtualbox-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-devel-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-guest-desktop-icons-6.1.34-lp153.2.27.2.noarch",
"openSUSE Leap 15.3:virtualbox-guest-source-6.1.34-lp153.2.27.2.noarch",
"openSUSE Leap 15.3:virtualbox-guest-tools-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-guest-x11-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-host-source-6.1.34-lp153.2.27.2.noarch",
"openSUSE Leap 15.3:virtualbox-kmp-default-6.1.34_k5.3.18_150300.59.63-lp153.2.27.1.x86_64",
"openSUSE Leap 15.3:virtualbox-kmp-preempt-6.1.34_k5.3.18_150300.59.63-lp153.2.27.1.x86_64",
"openSUSE Leap 15.3:virtualbox-qt-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-vnc-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-websrv-6.1.34-lp153.2.27.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N",
"version": "3.0"
},
"products": [
"openSUSE Leap 15.3:busybox-1.34.1-4.9.1.aarch64",
"openSUSE Leap 15.3:busybox-1.34.1-4.9.1.ppc64le",
"openSUSE Leap 15.3:busybox-1.34.1-4.9.1.s390x",
"openSUSE Leap 15.3:busybox-1.34.1-4.9.1.x86_64",
"openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.aarch64",
"openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.ppc64le",
"openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.s390x",
"openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.x86_64",
"openSUSE Leap 15.3:python3-virtualbox-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-devel-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-guest-desktop-icons-6.1.34-lp153.2.27.2.noarch",
"openSUSE Leap 15.3:virtualbox-guest-source-6.1.34-lp153.2.27.2.noarch",
"openSUSE Leap 15.3:virtualbox-guest-tools-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-guest-x11-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-host-source-6.1.34-lp153.2.27.2.noarch",
"openSUSE Leap 15.3:virtualbox-kmp-default-6.1.34_k5.3.18_150300.59.63-lp153.2.27.1.x86_64",
"openSUSE Leap 15.3:virtualbox-kmp-preempt-6.1.34_k5.3.18_150300.59.63-lp153.2.27.1.x86_64",
"openSUSE Leap 15.3:virtualbox-qt-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-vnc-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-websrv-6.1.34-lp153.2.27.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-01-20T09:04:27Z",
"details": "important"
}
],
"title": "CVE-2018-1000500"
},
{
"cve": "CVE-2018-1000517",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2018-1000517"
}
],
"notes": [
{
"category": "general",
"text": "BusyBox project BusyBox wget version prior to commit 8e2174e9bd836e53c8b9c6e00d1bc6e2a718686e contains a Buffer Overflow vulnerability in Busybox wget that can result in heap buffer overflow. This attack appear to be exploitable via network connectivity. This vulnerability appears to have been fixed in after commit 8e2174e9bd836e53c8b9c6e00d1bc6e2a718686e.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.3:busybox-1.34.1-4.9.1.aarch64",
"openSUSE Leap 15.3:busybox-1.34.1-4.9.1.ppc64le",
"openSUSE Leap 15.3:busybox-1.34.1-4.9.1.s390x",
"openSUSE Leap 15.3:busybox-1.34.1-4.9.1.x86_64",
"openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.aarch64",
"openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.ppc64le",
"openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.s390x",
"openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.x86_64",
"openSUSE Leap 15.3:python3-virtualbox-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-devel-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-guest-desktop-icons-6.1.34-lp153.2.27.2.noarch",
"openSUSE Leap 15.3:virtualbox-guest-source-6.1.34-lp153.2.27.2.noarch",
"openSUSE Leap 15.3:virtualbox-guest-tools-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-guest-x11-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-host-source-6.1.34-lp153.2.27.2.noarch",
"openSUSE Leap 15.3:virtualbox-kmp-default-6.1.34_k5.3.18_150300.59.63-lp153.2.27.1.x86_64",
"openSUSE Leap 15.3:virtualbox-kmp-preempt-6.1.34_k5.3.18_150300.59.63-lp153.2.27.1.x86_64",
"openSUSE Leap 15.3:virtualbox-qt-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-vnc-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-websrv-6.1.34-lp153.2.27.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2018-1000517",
"url": "https://www.suse.com/security/cve/CVE-2018-1000517"
},
{
"category": "external",
"summary": "SUSE Bug 1099260 for CVE-2018-1000517",
"url": "https://bugzilla.suse.com/1099260"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.3:busybox-1.34.1-4.9.1.aarch64",
"openSUSE Leap 15.3:busybox-1.34.1-4.9.1.ppc64le",
"openSUSE Leap 15.3:busybox-1.34.1-4.9.1.s390x",
"openSUSE Leap 15.3:busybox-1.34.1-4.9.1.x86_64",
"openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.aarch64",
"openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.ppc64le",
"openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.s390x",
"openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.x86_64",
"openSUSE Leap 15.3:python3-virtualbox-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-devel-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-guest-desktop-icons-6.1.34-lp153.2.27.2.noarch",
"openSUSE Leap 15.3:virtualbox-guest-source-6.1.34-lp153.2.27.2.noarch",
"openSUSE Leap 15.3:virtualbox-guest-tools-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-guest-x11-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-host-source-6.1.34-lp153.2.27.2.noarch",
"openSUSE Leap 15.3:virtualbox-kmp-default-6.1.34_k5.3.18_150300.59.63-lp153.2.27.1.x86_64",
"openSUSE Leap 15.3:virtualbox-kmp-preempt-6.1.34_k5.3.18_150300.59.63-lp153.2.27.1.x86_64",
"openSUSE Leap 15.3:virtualbox-qt-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-vnc-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-websrv-6.1.34-lp153.2.27.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.6,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L",
"version": "3.0"
},
"products": [
"openSUSE Leap 15.3:busybox-1.34.1-4.9.1.aarch64",
"openSUSE Leap 15.3:busybox-1.34.1-4.9.1.ppc64le",
"openSUSE Leap 15.3:busybox-1.34.1-4.9.1.s390x",
"openSUSE Leap 15.3:busybox-1.34.1-4.9.1.x86_64",
"openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.aarch64",
"openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.ppc64le",
"openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.s390x",
"openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.x86_64",
"openSUSE Leap 15.3:python3-virtualbox-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-devel-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-guest-desktop-icons-6.1.34-lp153.2.27.2.noarch",
"openSUSE Leap 15.3:virtualbox-guest-source-6.1.34-lp153.2.27.2.noarch",
"openSUSE Leap 15.3:virtualbox-guest-tools-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-guest-x11-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-host-source-6.1.34-lp153.2.27.2.noarch",
"openSUSE Leap 15.3:virtualbox-kmp-default-6.1.34_k5.3.18_150300.59.63-lp153.2.27.1.x86_64",
"openSUSE Leap 15.3:virtualbox-kmp-preempt-6.1.34_k5.3.18_150300.59.63-lp153.2.27.1.x86_64",
"openSUSE Leap 15.3:virtualbox-qt-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-vnc-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-websrv-6.1.34-lp153.2.27.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-01-20T09:04:27Z",
"details": "important"
}
],
"title": "CVE-2018-1000517"
},
{
"cve": "CVE-2018-20679",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2018-20679"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in BusyBox before 1.30.0. An out of bounds read in udhcp components (consumed by the DHCP server, client, and relay) allows a remote attacker to leak sensitive information from the stack by sending a crafted DHCP message. This is related to verification in udhcp_get_option() in networking/udhcp/common.c that 4-byte options are indeed 4 bytes.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.3:busybox-1.34.1-4.9.1.aarch64",
"openSUSE Leap 15.3:busybox-1.34.1-4.9.1.ppc64le",
"openSUSE Leap 15.3:busybox-1.34.1-4.9.1.s390x",
"openSUSE Leap 15.3:busybox-1.34.1-4.9.1.x86_64",
"openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.aarch64",
"openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.ppc64le",
"openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.s390x",
"openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.x86_64",
"openSUSE Leap 15.3:python3-virtualbox-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-devel-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-guest-desktop-icons-6.1.34-lp153.2.27.2.noarch",
"openSUSE Leap 15.3:virtualbox-guest-source-6.1.34-lp153.2.27.2.noarch",
"openSUSE Leap 15.3:virtualbox-guest-tools-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-guest-x11-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-host-source-6.1.34-lp153.2.27.2.noarch",
"openSUSE Leap 15.3:virtualbox-kmp-default-6.1.34_k5.3.18_150300.59.63-lp153.2.27.1.x86_64",
"openSUSE Leap 15.3:virtualbox-kmp-preempt-6.1.34_k5.3.18_150300.59.63-lp153.2.27.1.x86_64",
"openSUSE Leap 15.3:virtualbox-qt-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-vnc-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-websrv-6.1.34-lp153.2.27.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2018-20679",
"url": "https://www.suse.com/security/cve/CVE-2018-20679"
},
{
"category": "external",
"summary": "SUSE Bug 1121426 for CVE-2018-20679",
"url": "https://bugzilla.suse.com/1121426"
},
{
"category": "external",
"summary": "SUSE Bug 1121428 for CVE-2018-20679",
"url": "https://bugzilla.suse.com/1121428"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.3:busybox-1.34.1-4.9.1.aarch64",
"openSUSE Leap 15.3:busybox-1.34.1-4.9.1.ppc64le",
"openSUSE Leap 15.3:busybox-1.34.1-4.9.1.s390x",
"openSUSE Leap 15.3:busybox-1.34.1-4.9.1.x86_64",
"openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.aarch64",
"openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.ppc64le",
"openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.s390x",
"openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.x86_64",
"openSUSE Leap 15.3:python3-virtualbox-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-devel-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-guest-desktop-icons-6.1.34-lp153.2.27.2.noarch",
"openSUSE Leap 15.3:virtualbox-guest-source-6.1.34-lp153.2.27.2.noarch",
"openSUSE Leap 15.3:virtualbox-guest-tools-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-guest-x11-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-host-source-6.1.34-lp153.2.27.2.noarch",
"openSUSE Leap 15.3:virtualbox-kmp-default-6.1.34_k5.3.18_150300.59.63-lp153.2.27.1.x86_64",
"openSUSE Leap 15.3:virtualbox-kmp-preempt-6.1.34_k5.3.18_150300.59.63-lp153.2.27.1.x86_64",
"openSUSE Leap 15.3:virtualbox-qt-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-vnc-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-websrv-6.1.34-lp153.2.27.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
"version": "3.0"
},
"products": [
"openSUSE Leap 15.3:busybox-1.34.1-4.9.1.aarch64",
"openSUSE Leap 15.3:busybox-1.34.1-4.9.1.ppc64le",
"openSUSE Leap 15.3:busybox-1.34.1-4.9.1.s390x",
"openSUSE Leap 15.3:busybox-1.34.1-4.9.1.x86_64",
"openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.aarch64",
"openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.ppc64le",
"openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.s390x",
"openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.x86_64",
"openSUSE Leap 15.3:python3-virtualbox-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-devel-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-guest-desktop-icons-6.1.34-lp153.2.27.2.noarch",
"openSUSE Leap 15.3:virtualbox-guest-source-6.1.34-lp153.2.27.2.noarch",
"openSUSE Leap 15.3:virtualbox-guest-tools-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-guest-x11-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-host-source-6.1.34-lp153.2.27.2.noarch",
"openSUSE Leap 15.3:virtualbox-kmp-default-6.1.34_k5.3.18_150300.59.63-lp153.2.27.1.x86_64",
"openSUSE Leap 15.3:virtualbox-kmp-preempt-6.1.34_k5.3.18_150300.59.63-lp153.2.27.1.x86_64",
"openSUSE Leap 15.3:virtualbox-qt-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-vnc-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-websrv-6.1.34-lp153.2.27.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-01-20T09:04:27Z",
"details": "moderate"
}
],
"title": "CVE-2018-20679"
},
{
"cve": "CVE-2019-5747",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-5747"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in BusyBox through 1.30.0. An out of bounds read in udhcp components (consumed by the DHCP client, server, and/or relay) might allow a remote attacker to leak sensitive information from the stack by sending a crafted DHCP message. This is related to assurance of a 4-byte length when decoding DHCP_SUBNET. NOTE: this issue exists because of an incomplete fix for CVE-2018-20679.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.3:busybox-1.34.1-4.9.1.aarch64",
"openSUSE Leap 15.3:busybox-1.34.1-4.9.1.ppc64le",
"openSUSE Leap 15.3:busybox-1.34.1-4.9.1.s390x",
"openSUSE Leap 15.3:busybox-1.34.1-4.9.1.x86_64",
"openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.aarch64",
"openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.ppc64le",
"openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.s390x",
"openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.x86_64",
"openSUSE Leap 15.3:python3-virtualbox-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-devel-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-guest-desktop-icons-6.1.34-lp153.2.27.2.noarch",
"openSUSE Leap 15.3:virtualbox-guest-source-6.1.34-lp153.2.27.2.noarch",
"openSUSE Leap 15.3:virtualbox-guest-tools-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-guest-x11-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-host-source-6.1.34-lp153.2.27.2.noarch",
"openSUSE Leap 15.3:virtualbox-kmp-default-6.1.34_k5.3.18_150300.59.63-lp153.2.27.1.x86_64",
"openSUSE Leap 15.3:virtualbox-kmp-preempt-6.1.34_k5.3.18_150300.59.63-lp153.2.27.1.x86_64",
"openSUSE Leap 15.3:virtualbox-qt-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-vnc-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-websrv-6.1.34-lp153.2.27.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-5747",
"url": "https://www.suse.com/security/cve/CVE-2019-5747"
},
{
"category": "external",
"summary": "SUSE Bug 1121426 for CVE-2019-5747",
"url": "https://bugzilla.suse.com/1121426"
},
{
"category": "external",
"summary": "SUSE Bug 1121428 for CVE-2019-5747",
"url": "https://bugzilla.suse.com/1121428"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.3:busybox-1.34.1-4.9.1.aarch64",
"openSUSE Leap 15.3:busybox-1.34.1-4.9.1.ppc64le",
"openSUSE Leap 15.3:busybox-1.34.1-4.9.1.s390x",
"openSUSE Leap 15.3:busybox-1.34.1-4.9.1.x86_64",
"openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.aarch64",
"openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.ppc64le",
"openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.s390x",
"openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.x86_64",
"openSUSE Leap 15.3:python3-virtualbox-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-devel-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-guest-desktop-icons-6.1.34-lp153.2.27.2.noarch",
"openSUSE Leap 15.3:virtualbox-guest-source-6.1.34-lp153.2.27.2.noarch",
"openSUSE Leap 15.3:virtualbox-guest-tools-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-guest-x11-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-host-source-6.1.34-lp153.2.27.2.noarch",
"openSUSE Leap 15.3:virtualbox-kmp-default-6.1.34_k5.3.18_150300.59.63-lp153.2.27.1.x86_64",
"openSUSE Leap 15.3:virtualbox-kmp-preempt-6.1.34_k5.3.18_150300.59.63-lp153.2.27.1.x86_64",
"openSUSE Leap 15.3:virtualbox-qt-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-vnc-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-websrv-6.1.34-lp153.2.27.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.5,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.3:busybox-1.34.1-4.9.1.aarch64",
"openSUSE Leap 15.3:busybox-1.34.1-4.9.1.ppc64le",
"openSUSE Leap 15.3:busybox-1.34.1-4.9.1.s390x",
"openSUSE Leap 15.3:busybox-1.34.1-4.9.1.x86_64",
"openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.aarch64",
"openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.ppc64le",
"openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.s390x",
"openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.x86_64",
"openSUSE Leap 15.3:python3-virtualbox-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-devel-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-guest-desktop-icons-6.1.34-lp153.2.27.2.noarch",
"openSUSE Leap 15.3:virtualbox-guest-source-6.1.34-lp153.2.27.2.noarch",
"openSUSE Leap 15.3:virtualbox-guest-tools-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-guest-x11-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-host-source-6.1.34-lp153.2.27.2.noarch",
"openSUSE Leap 15.3:virtualbox-kmp-default-6.1.34_k5.3.18_150300.59.63-lp153.2.27.1.x86_64",
"openSUSE Leap 15.3:virtualbox-kmp-preempt-6.1.34_k5.3.18_150300.59.63-lp153.2.27.1.x86_64",
"openSUSE Leap 15.3:virtualbox-qt-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-vnc-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-websrv-6.1.34-lp153.2.27.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-01-20T09:04:27Z",
"details": "low"
}
],
"title": "CVE-2019-5747"
},
{
"cve": "CVE-2021-28831",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-28831"
}
],
"notes": [
{
"category": "general",
"text": "decompress_gunzip.c in BusyBox through 1.32.1 mishandles the error bit on the huft_build result pointer, with a resultant invalid free or segmentation fault, via malformed gzip data.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.3:busybox-1.34.1-4.9.1.aarch64",
"openSUSE Leap 15.3:busybox-1.34.1-4.9.1.ppc64le",
"openSUSE Leap 15.3:busybox-1.34.1-4.9.1.s390x",
"openSUSE Leap 15.3:busybox-1.34.1-4.9.1.x86_64",
"openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.aarch64",
"openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.ppc64le",
"openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.s390x",
"openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.x86_64",
"openSUSE Leap 15.3:python3-virtualbox-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-devel-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-guest-desktop-icons-6.1.34-lp153.2.27.2.noarch",
"openSUSE Leap 15.3:virtualbox-guest-source-6.1.34-lp153.2.27.2.noarch",
"openSUSE Leap 15.3:virtualbox-guest-tools-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-guest-x11-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-host-source-6.1.34-lp153.2.27.2.noarch",
"openSUSE Leap 15.3:virtualbox-kmp-default-6.1.34_k5.3.18_150300.59.63-lp153.2.27.1.x86_64",
"openSUSE Leap 15.3:virtualbox-kmp-preempt-6.1.34_k5.3.18_150300.59.63-lp153.2.27.1.x86_64",
"openSUSE Leap 15.3:virtualbox-qt-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-vnc-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-websrv-6.1.34-lp153.2.27.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-28831",
"url": "https://www.suse.com/security/cve/CVE-2021-28831"
},
{
"category": "external",
"summary": "SUSE Bug 1184522 for CVE-2021-28831",
"url": "https://bugzilla.suse.com/1184522"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.3:busybox-1.34.1-4.9.1.aarch64",
"openSUSE Leap 15.3:busybox-1.34.1-4.9.1.ppc64le",
"openSUSE Leap 15.3:busybox-1.34.1-4.9.1.s390x",
"openSUSE Leap 15.3:busybox-1.34.1-4.9.1.x86_64",
"openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.aarch64",
"openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.ppc64le",
"openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.s390x",
"openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.x86_64",
"openSUSE Leap 15.3:python3-virtualbox-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-devel-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-guest-desktop-icons-6.1.34-lp153.2.27.2.noarch",
"openSUSE Leap 15.3:virtualbox-guest-source-6.1.34-lp153.2.27.2.noarch",
"openSUSE Leap 15.3:virtualbox-guest-tools-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-guest-x11-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-host-source-6.1.34-lp153.2.27.2.noarch",
"openSUSE Leap 15.3:virtualbox-kmp-default-6.1.34_k5.3.18_150300.59.63-lp153.2.27.1.x86_64",
"openSUSE Leap 15.3:virtualbox-kmp-preempt-6.1.34_k5.3.18_150300.59.63-lp153.2.27.1.x86_64",
"openSUSE Leap 15.3:virtualbox-qt-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-vnc-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-websrv-6.1.34-lp153.2.27.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.3:busybox-1.34.1-4.9.1.aarch64",
"openSUSE Leap 15.3:busybox-1.34.1-4.9.1.ppc64le",
"openSUSE Leap 15.3:busybox-1.34.1-4.9.1.s390x",
"openSUSE Leap 15.3:busybox-1.34.1-4.9.1.x86_64",
"openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.aarch64",
"openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.ppc64le",
"openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.s390x",
"openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.x86_64",
"openSUSE Leap 15.3:python3-virtualbox-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-devel-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-guest-desktop-icons-6.1.34-lp153.2.27.2.noarch",
"openSUSE Leap 15.3:virtualbox-guest-source-6.1.34-lp153.2.27.2.noarch",
"openSUSE Leap 15.3:virtualbox-guest-tools-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-guest-x11-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-host-source-6.1.34-lp153.2.27.2.noarch",
"openSUSE Leap 15.3:virtualbox-kmp-default-6.1.34_k5.3.18_150300.59.63-lp153.2.27.1.x86_64",
"openSUSE Leap 15.3:virtualbox-kmp-preempt-6.1.34_k5.3.18_150300.59.63-lp153.2.27.1.x86_64",
"openSUSE Leap 15.3:virtualbox-qt-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-vnc-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-websrv-6.1.34-lp153.2.27.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-01-20T09:04:27Z",
"details": "important"
}
],
"title": "CVE-2021-28831"
},
{
"cve": "CVE-2021-42373",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-42373"
}
],
"notes": [
{
"category": "general",
"text": "A NULL pointer dereference in Busybox\u0027s man applet leads to denial of service when a section name is supplied but no page argument is given",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.3:busybox-1.34.1-4.9.1.aarch64",
"openSUSE Leap 15.3:busybox-1.34.1-4.9.1.ppc64le",
"openSUSE Leap 15.3:busybox-1.34.1-4.9.1.s390x",
"openSUSE Leap 15.3:busybox-1.34.1-4.9.1.x86_64",
"openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.aarch64",
"openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.ppc64le",
"openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.s390x",
"openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.x86_64",
"openSUSE Leap 15.3:python3-virtualbox-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-devel-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-guest-desktop-icons-6.1.34-lp153.2.27.2.noarch",
"openSUSE Leap 15.3:virtualbox-guest-source-6.1.34-lp153.2.27.2.noarch",
"openSUSE Leap 15.3:virtualbox-guest-tools-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-guest-x11-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-host-source-6.1.34-lp153.2.27.2.noarch",
"openSUSE Leap 15.3:virtualbox-kmp-default-6.1.34_k5.3.18_150300.59.63-lp153.2.27.1.x86_64",
"openSUSE Leap 15.3:virtualbox-kmp-preempt-6.1.34_k5.3.18_150300.59.63-lp153.2.27.1.x86_64",
"openSUSE Leap 15.3:virtualbox-qt-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-vnc-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-websrv-6.1.34-lp153.2.27.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-42373",
"url": "https://www.suse.com/security/cve/CVE-2021-42373"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.3:busybox-1.34.1-4.9.1.aarch64",
"openSUSE Leap 15.3:busybox-1.34.1-4.9.1.ppc64le",
"openSUSE Leap 15.3:busybox-1.34.1-4.9.1.s390x",
"openSUSE Leap 15.3:busybox-1.34.1-4.9.1.x86_64",
"openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.aarch64",
"openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.ppc64le",
"openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.s390x",
"openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.x86_64",
"openSUSE Leap 15.3:python3-virtualbox-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-devel-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-guest-desktop-icons-6.1.34-lp153.2.27.2.noarch",
"openSUSE Leap 15.3:virtualbox-guest-source-6.1.34-lp153.2.27.2.noarch",
"openSUSE Leap 15.3:virtualbox-guest-tools-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-guest-x11-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-host-source-6.1.34-lp153.2.27.2.noarch",
"openSUSE Leap 15.3:virtualbox-kmp-default-6.1.34_k5.3.18_150300.59.63-lp153.2.27.1.x86_64",
"openSUSE Leap 15.3:virtualbox-kmp-preempt-6.1.34_k5.3.18_150300.59.63-lp153.2.27.1.x86_64",
"openSUSE Leap 15.3:virtualbox-qt-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-vnc-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-websrv-6.1.34-lp153.2.27.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.3:busybox-1.34.1-4.9.1.aarch64",
"openSUSE Leap 15.3:busybox-1.34.1-4.9.1.ppc64le",
"openSUSE Leap 15.3:busybox-1.34.1-4.9.1.s390x",
"openSUSE Leap 15.3:busybox-1.34.1-4.9.1.x86_64",
"openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.aarch64",
"openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.ppc64le",
"openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.s390x",
"openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.x86_64",
"openSUSE Leap 15.3:python3-virtualbox-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-devel-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-guest-desktop-icons-6.1.34-lp153.2.27.2.noarch",
"openSUSE Leap 15.3:virtualbox-guest-source-6.1.34-lp153.2.27.2.noarch",
"openSUSE Leap 15.3:virtualbox-guest-tools-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-guest-x11-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-host-source-6.1.34-lp153.2.27.2.noarch",
"openSUSE Leap 15.3:virtualbox-kmp-default-6.1.34_k5.3.18_150300.59.63-lp153.2.27.1.x86_64",
"openSUSE Leap 15.3:virtualbox-kmp-preempt-6.1.34_k5.3.18_150300.59.63-lp153.2.27.1.x86_64",
"openSUSE Leap 15.3:virtualbox-qt-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-vnc-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-websrv-6.1.34-lp153.2.27.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-01-20T09:04:27Z",
"details": "moderate"
}
],
"title": "CVE-2021-42373"
},
{
"cve": "CVE-2021-42374",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-42374"
}
],
"notes": [
{
"category": "general",
"text": "An out-of-bounds heap read in Busybox\u0027s unlzma applet leads to information leak and denial of service when crafted LZMA-compressed input is decompressed. This can be triggered by any applet/format that",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.3:busybox-1.34.1-4.9.1.aarch64",
"openSUSE Leap 15.3:busybox-1.34.1-4.9.1.ppc64le",
"openSUSE Leap 15.3:busybox-1.34.1-4.9.1.s390x",
"openSUSE Leap 15.3:busybox-1.34.1-4.9.1.x86_64",
"openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.aarch64",
"openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.ppc64le",
"openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.s390x",
"openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.x86_64",
"openSUSE Leap 15.3:python3-virtualbox-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-devel-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-guest-desktop-icons-6.1.34-lp153.2.27.2.noarch",
"openSUSE Leap 15.3:virtualbox-guest-source-6.1.34-lp153.2.27.2.noarch",
"openSUSE Leap 15.3:virtualbox-guest-tools-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-guest-x11-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-host-source-6.1.34-lp153.2.27.2.noarch",
"openSUSE Leap 15.3:virtualbox-kmp-default-6.1.34_k5.3.18_150300.59.63-lp153.2.27.1.x86_64",
"openSUSE Leap 15.3:virtualbox-kmp-preempt-6.1.34_k5.3.18_150300.59.63-lp153.2.27.1.x86_64",
"openSUSE Leap 15.3:virtualbox-qt-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-vnc-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-websrv-6.1.34-lp153.2.27.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-42374",
"url": "https://www.suse.com/security/cve/CVE-2021-42374"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.3:busybox-1.34.1-4.9.1.aarch64",
"openSUSE Leap 15.3:busybox-1.34.1-4.9.1.ppc64le",
"openSUSE Leap 15.3:busybox-1.34.1-4.9.1.s390x",
"openSUSE Leap 15.3:busybox-1.34.1-4.9.1.x86_64",
"openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.aarch64",
"openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.ppc64le",
"openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.s390x",
"openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.x86_64",
"openSUSE Leap 15.3:python3-virtualbox-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-devel-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-guest-desktop-icons-6.1.34-lp153.2.27.2.noarch",
"openSUSE Leap 15.3:virtualbox-guest-source-6.1.34-lp153.2.27.2.noarch",
"openSUSE Leap 15.3:virtualbox-guest-tools-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-guest-x11-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-host-source-6.1.34-lp153.2.27.2.noarch",
"openSUSE Leap 15.3:virtualbox-kmp-default-6.1.34_k5.3.18_150300.59.63-lp153.2.27.1.x86_64",
"openSUSE Leap 15.3:virtualbox-kmp-preempt-6.1.34_k5.3.18_150300.59.63-lp153.2.27.1.x86_64",
"openSUSE Leap 15.3:virtualbox-qt-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-vnc-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-websrv-6.1.34-lp153.2.27.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.3:busybox-1.34.1-4.9.1.aarch64",
"openSUSE Leap 15.3:busybox-1.34.1-4.9.1.ppc64le",
"openSUSE Leap 15.3:busybox-1.34.1-4.9.1.s390x",
"openSUSE Leap 15.3:busybox-1.34.1-4.9.1.x86_64",
"openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.aarch64",
"openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.ppc64le",
"openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.s390x",
"openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.x86_64",
"openSUSE Leap 15.3:python3-virtualbox-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-devel-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-guest-desktop-icons-6.1.34-lp153.2.27.2.noarch",
"openSUSE Leap 15.3:virtualbox-guest-source-6.1.34-lp153.2.27.2.noarch",
"openSUSE Leap 15.3:virtualbox-guest-tools-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-guest-x11-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-host-source-6.1.34-lp153.2.27.2.noarch",
"openSUSE Leap 15.3:virtualbox-kmp-default-6.1.34_k5.3.18_150300.59.63-lp153.2.27.1.x86_64",
"openSUSE Leap 15.3:virtualbox-kmp-preempt-6.1.34_k5.3.18_150300.59.63-lp153.2.27.1.x86_64",
"openSUSE Leap 15.3:virtualbox-qt-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-vnc-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-websrv-6.1.34-lp153.2.27.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-01-20T09:04:27Z",
"details": "moderate"
}
],
"title": "CVE-2021-42374"
},
{
"cve": "CVE-2021-42375",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-42375"
}
],
"notes": [
{
"category": "general",
"text": "An incorrect handling of a special element in Busybox\u0027s ash applet leads to denial of service when processing a crafted shell command, due to the shell mistaking specific characters for reserved characters. This may be used for DoS under rare conditions of filtered command input.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.3:busybox-1.34.1-4.9.1.aarch64",
"openSUSE Leap 15.3:busybox-1.34.1-4.9.1.ppc64le",
"openSUSE Leap 15.3:busybox-1.34.1-4.9.1.s390x",
"openSUSE Leap 15.3:busybox-1.34.1-4.9.1.x86_64",
"openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.aarch64",
"openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.ppc64le",
"openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.s390x",
"openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.x86_64",
"openSUSE Leap 15.3:python3-virtualbox-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-devel-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-guest-desktop-icons-6.1.34-lp153.2.27.2.noarch",
"openSUSE Leap 15.3:virtualbox-guest-source-6.1.34-lp153.2.27.2.noarch",
"openSUSE Leap 15.3:virtualbox-guest-tools-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-guest-x11-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-host-source-6.1.34-lp153.2.27.2.noarch",
"openSUSE Leap 15.3:virtualbox-kmp-default-6.1.34_k5.3.18_150300.59.63-lp153.2.27.1.x86_64",
"openSUSE Leap 15.3:virtualbox-kmp-preempt-6.1.34_k5.3.18_150300.59.63-lp153.2.27.1.x86_64",
"openSUSE Leap 15.3:virtualbox-qt-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-vnc-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-websrv-6.1.34-lp153.2.27.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-42375",
"url": "https://www.suse.com/security/cve/CVE-2021-42375"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.3:busybox-1.34.1-4.9.1.aarch64",
"openSUSE Leap 15.3:busybox-1.34.1-4.9.1.ppc64le",
"openSUSE Leap 15.3:busybox-1.34.1-4.9.1.s390x",
"openSUSE Leap 15.3:busybox-1.34.1-4.9.1.x86_64",
"openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.aarch64",
"openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.ppc64le",
"openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.s390x",
"openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.x86_64",
"openSUSE Leap 15.3:python3-virtualbox-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-devel-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-guest-desktop-icons-6.1.34-lp153.2.27.2.noarch",
"openSUSE Leap 15.3:virtualbox-guest-source-6.1.34-lp153.2.27.2.noarch",
"openSUSE Leap 15.3:virtualbox-guest-tools-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-guest-x11-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-host-source-6.1.34-lp153.2.27.2.noarch",
"openSUSE Leap 15.3:virtualbox-kmp-default-6.1.34_k5.3.18_150300.59.63-lp153.2.27.1.x86_64",
"openSUSE Leap 15.3:virtualbox-kmp-preempt-6.1.34_k5.3.18_150300.59.63-lp153.2.27.1.x86_64",
"openSUSE Leap 15.3:virtualbox-qt-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-vnc-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-websrv-6.1.34-lp153.2.27.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.1,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.3:busybox-1.34.1-4.9.1.aarch64",
"openSUSE Leap 15.3:busybox-1.34.1-4.9.1.ppc64le",
"openSUSE Leap 15.3:busybox-1.34.1-4.9.1.s390x",
"openSUSE Leap 15.3:busybox-1.34.1-4.9.1.x86_64",
"openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.aarch64",
"openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.ppc64le",
"openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.s390x",
"openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.x86_64",
"openSUSE Leap 15.3:python3-virtualbox-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-devel-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-guest-desktop-icons-6.1.34-lp153.2.27.2.noarch",
"openSUSE Leap 15.3:virtualbox-guest-source-6.1.34-lp153.2.27.2.noarch",
"openSUSE Leap 15.3:virtualbox-guest-tools-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-guest-x11-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-host-source-6.1.34-lp153.2.27.2.noarch",
"openSUSE Leap 15.3:virtualbox-kmp-default-6.1.34_k5.3.18_150300.59.63-lp153.2.27.1.x86_64",
"openSUSE Leap 15.3:virtualbox-kmp-preempt-6.1.34_k5.3.18_150300.59.63-lp153.2.27.1.x86_64",
"openSUSE Leap 15.3:virtualbox-qt-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-vnc-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-websrv-6.1.34-lp153.2.27.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-01-20T09:04:27Z",
"details": "moderate"
}
],
"title": "CVE-2021-42375"
},
{
"cve": "CVE-2021-42376",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-42376"
}
],
"notes": [
{
"category": "general",
"text": "A NULL pointer dereference in Busybox\u0027s hush applet leads to denial of service when processing a crafted shell command, due to missing validation after a \\x03 delimiter character. This may be used for DoS under very rare conditions of filtered command input.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.3:busybox-1.34.1-4.9.1.aarch64",
"openSUSE Leap 15.3:busybox-1.34.1-4.9.1.ppc64le",
"openSUSE Leap 15.3:busybox-1.34.1-4.9.1.s390x",
"openSUSE Leap 15.3:busybox-1.34.1-4.9.1.x86_64",
"openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.aarch64",
"openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.ppc64le",
"openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.s390x",
"openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.x86_64",
"openSUSE Leap 15.3:python3-virtualbox-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-devel-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-guest-desktop-icons-6.1.34-lp153.2.27.2.noarch",
"openSUSE Leap 15.3:virtualbox-guest-source-6.1.34-lp153.2.27.2.noarch",
"openSUSE Leap 15.3:virtualbox-guest-tools-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-guest-x11-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-host-source-6.1.34-lp153.2.27.2.noarch",
"openSUSE Leap 15.3:virtualbox-kmp-default-6.1.34_k5.3.18_150300.59.63-lp153.2.27.1.x86_64",
"openSUSE Leap 15.3:virtualbox-kmp-preempt-6.1.34_k5.3.18_150300.59.63-lp153.2.27.1.x86_64",
"openSUSE Leap 15.3:virtualbox-qt-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-vnc-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-websrv-6.1.34-lp153.2.27.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-42376",
"url": "https://www.suse.com/security/cve/CVE-2021-42376"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.3:busybox-1.34.1-4.9.1.aarch64",
"openSUSE Leap 15.3:busybox-1.34.1-4.9.1.ppc64le",
"openSUSE Leap 15.3:busybox-1.34.1-4.9.1.s390x",
"openSUSE Leap 15.3:busybox-1.34.1-4.9.1.x86_64",
"openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.aarch64",
"openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.ppc64le",
"openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.s390x",
"openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.x86_64",
"openSUSE Leap 15.3:python3-virtualbox-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-devel-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-guest-desktop-icons-6.1.34-lp153.2.27.2.noarch",
"openSUSE Leap 15.3:virtualbox-guest-source-6.1.34-lp153.2.27.2.noarch",
"openSUSE Leap 15.3:virtualbox-guest-tools-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-guest-x11-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-host-source-6.1.34-lp153.2.27.2.noarch",
"openSUSE Leap 15.3:virtualbox-kmp-default-6.1.34_k5.3.18_150300.59.63-lp153.2.27.1.x86_64",
"openSUSE Leap 15.3:virtualbox-kmp-preempt-6.1.34_k5.3.18_150300.59.63-lp153.2.27.1.x86_64",
"openSUSE Leap 15.3:virtualbox-qt-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-vnc-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-websrv-6.1.34-lp153.2.27.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.1,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.3:busybox-1.34.1-4.9.1.aarch64",
"openSUSE Leap 15.3:busybox-1.34.1-4.9.1.ppc64le",
"openSUSE Leap 15.3:busybox-1.34.1-4.9.1.s390x",
"openSUSE Leap 15.3:busybox-1.34.1-4.9.1.x86_64",
"openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.aarch64",
"openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.ppc64le",
"openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.s390x",
"openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.x86_64",
"openSUSE Leap 15.3:python3-virtualbox-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-devel-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-guest-desktop-icons-6.1.34-lp153.2.27.2.noarch",
"openSUSE Leap 15.3:virtualbox-guest-source-6.1.34-lp153.2.27.2.noarch",
"openSUSE Leap 15.3:virtualbox-guest-tools-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-guest-x11-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-host-source-6.1.34-lp153.2.27.2.noarch",
"openSUSE Leap 15.3:virtualbox-kmp-default-6.1.34_k5.3.18_150300.59.63-lp153.2.27.1.x86_64",
"openSUSE Leap 15.3:virtualbox-kmp-preempt-6.1.34_k5.3.18_150300.59.63-lp153.2.27.1.x86_64",
"openSUSE Leap 15.3:virtualbox-qt-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-vnc-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-websrv-6.1.34-lp153.2.27.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-01-20T09:04:27Z",
"details": "moderate"
}
],
"title": "CVE-2021-42376"
},
{
"cve": "CVE-2021-42377",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-42377"
}
],
"notes": [
{
"category": "general",
"text": "An attacker-controlled pointer free in Busybox\u0027s hush applet leads to denial of service and possible code execution when processing a crafted shell command, due to the shell mishandling the \u0026\u0026\u0026 string. This may be used for remote code execution under rare conditions of filtered command input.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.3:busybox-1.34.1-4.9.1.aarch64",
"openSUSE Leap 15.3:busybox-1.34.1-4.9.1.ppc64le",
"openSUSE Leap 15.3:busybox-1.34.1-4.9.1.s390x",
"openSUSE Leap 15.3:busybox-1.34.1-4.9.1.x86_64",
"openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.aarch64",
"openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.ppc64le",
"openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.s390x",
"openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.x86_64",
"openSUSE Leap 15.3:python3-virtualbox-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-devel-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-guest-desktop-icons-6.1.34-lp153.2.27.2.noarch",
"openSUSE Leap 15.3:virtualbox-guest-source-6.1.34-lp153.2.27.2.noarch",
"openSUSE Leap 15.3:virtualbox-guest-tools-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-guest-x11-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-host-source-6.1.34-lp153.2.27.2.noarch",
"openSUSE Leap 15.3:virtualbox-kmp-default-6.1.34_k5.3.18_150300.59.63-lp153.2.27.1.x86_64",
"openSUSE Leap 15.3:virtualbox-kmp-preempt-6.1.34_k5.3.18_150300.59.63-lp153.2.27.1.x86_64",
"openSUSE Leap 15.3:virtualbox-qt-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-vnc-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-websrv-6.1.34-lp153.2.27.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-42377",
"url": "https://www.suse.com/security/cve/CVE-2021-42377"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.3:busybox-1.34.1-4.9.1.aarch64",
"openSUSE Leap 15.3:busybox-1.34.1-4.9.1.ppc64le",
"openSUSE Leap 15.3:busybox-1.34.1-4.9.1.s390x",
"openSUSE Leap 15.3:busybox-1.34.1-4.9.1.x86_64",
"openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.aarch64",
"openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.ppc64le",
"openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.s390x",
"openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.x86_64",
"openSUSE Leap 15.3:python3-virtualbox-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-devel-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-guest-desktop-icons-6.1.34-lp153.2.27.2.noarch",
"openSUSE Leap 15.3:virtualbox-guest-source-6.1.34-lp153.2.27.2.noarch",
"openSUSE Leap 15.3:virtualbox-guest-tools-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-guest-x11-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-host-source-6.1.34-lp153.2.27.2.noarch",
"openSUSE Leap 15.3:virtualbox-kmp-default-6.1.34_k5.3.18_150300.59.63-lp153.2.27.1.x86_64",
"openSUSE Leap 15.3:virtualbox-kmp-preempt-6.1.34_k5.3.18_150300.59.63-lp153.2.27.1.x86_64",
"openSUSE Leap 15.3:virtualbox-qt-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-vnc-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-websrv-6.1.34-lp153.2.27.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.3:busybox-1.34.1-4.9.1.aarch64",
"openSUSE Leap 15.3:busybox-1.34.1-4.9.1.ppc64le",
"openSUSE Leap 15.3:busybox-1.34.1-4.9.1.s390x",
"openSUSE Leap 15.3:busybox-1.34.1-4.9.1.x86_64",
"openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.aarch64",
"openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.ppc64le",
"openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.s390x",
"openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.x86_64",
"openSUSE Leap 15.3:python3-virtualbox-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-devel-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-guest-desktop-icons-6.1.34-lp153.2.27.2.noarch",
"openSUSE Leap 15.3:virtualbox-guest-source-6.1.34-lp153.2.27.2.noarch",
"openSUSE Leap 15.3:virtualbox-guest-tools-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-guest-x11-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-host-source-6.1.34-lp153.2.27.2.noarch",
"openSUSE Leap 15.3:virtualbox-kmp-default-6.1.34_k5.3.18_150300.59.63-lp153.2.27.1.x86_64",
"openSUSE Leap 15.3:virtualbox-kmp-preempt-6.1.34_k5.3.18_150300.59.63-lp153.2.27.1.x86_64",
"openSUSE Leap 15.3:virtualbox-qt-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-vnc-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-websrv-6.1.34-lp153.2.27.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-01-20T09:04:27Z",
"details": "moderate"
}
],
"title": "CVE-2021-42377"
},
{
"cve": "CVE-2021-42378",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-42378"
}
],
"notes": [
{
"category": "general",
"text": "A use-after-free in Busybox\u0027s awk applet leads to denial of service and possibly code execution when processing a crafted awk pattern in the getvar_i function",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.3:busybox-1.34.1-4.9.1.aarch64",
"openSUSE Leap 15.3:busybox-1.34.1-4.9.1.ppc64le",
"openSUSE Leap 15.3:busybox-1.34.1-4.9.1.s390x",
"openSUSE Leap 15.3:busybox-1.34.1-4.9.1.x86_64",
"openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.aarch64",
"openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.ppc64le",
"openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.s390x",
"openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.x86_64",
"openSUSE Leap 15.3:python3-virtualbox-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-devel-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-guest-desktop-icons-6.1.34-lp153.2.27.2.noarch",
"openSUSE Leap 15.3:virtualbox-guest-source-6.1.34-lp153.2.27.2.noarch",
"openSUSE Leap 15.3:virtualbox-guest-tools-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-guest-x11-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-host-source-6.1.34-lp153.2.27.2.noarch",
"openSUSE Leap 15.3:virtualbox-kmp-default-6.1.34_k5.3.18_150300.59.63-lp153.2.27.1.x86_64",
"openSUSE Leap 15.3:virtualbox-kmp-preempt-6.1.34_k5.3.18_150300.59.63-lp153.2.27.1.x86_64",
"openSUSE Leap 15.3:virtualbox-qt-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-vnc-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-websrv-6.1.34-lp153.2.27.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-42378",
"url": "https://www.suse.com/security/cve/CVE-2021-42378"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.3:busybox-1.34.1-4.9.1.aarch64",
"openSUSE Leap 15.3:busybox-1.34.1-4.9.1.ppc64le",
"openSUSE Leap 15.3:busybox-1.34.1-4.9.1.s390x",
"openSUSE Leap 15.3:busybox-1.34.1-4.9.1.x86_64",
"openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.aarch64",
"openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.ppc64le",
"openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.s390x",
"openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.x86_64",
"openSUSE Leap 15.3:python3-virtualbox-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-devel-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-guest-desktop-icons-6.1.34-lp153.2.27.2.noarch",
"openSUSE Leap 15.3:virtualbox-guest-source-6.1.34-lp153.2.27.2.noarch",
"openSUSE Leap 15.3:virtualbox-guest-tools-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-guest-x11-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-host-source-6.1.34-lp153.2.27.2.noarch",
"openSUSE Leap 15.3:virtualbox-kmp-default-6.1.34_k5.3.18_150300.59.63-lp153.2.27.1.x86_64",
"openSUSE Leap 15.3:virtualbox-kmp-preempt-6.1.34_k5.3.18_150300.59.63-lp153.2.27.1.x86_64",
"openSUSE Leap 15.3:virtualbox-qt-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-vnc-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-websrv-6.1.34-lp153.2.27.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.6,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.3:busybox-1.34.1-4.9.1.aarch64",
"openSUSE Leap 15.3:busybox-1.34.1-4.9.1.ppc64le",
"openSUSE Leap 15.3:busybox-1.34.1-4.9.1.s390x",
"openSUSE Leap 15.3:busybox-1.34.1-4.9.1.x86_64",
"openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.aarch64",
"openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.ppc64le",
"openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.s390x",
"openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.x86_64",
"openSUSE Leap 15.3:python3-virtualbox-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-devel-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-guest-desktop-icons-6.1.34-lp153.2.27.2.noarch",
"openSUSE Leap 15.3:virtualbox-guest-source-6.1.34-lp153.2.27.2.noarch",
"openSUSE Leap 15.3:virtualbox-guest-tools-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-guest-x11-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-host-source-6.1.34-lp153.2.27.2.noarch",
"openSUSE Leap 15.3:virtualbox-kmp-default-6.1.34_k5.3.18_150300.59.63-lp153.2.27.1.x86_64",
"openSUSE Leap 15.3:virtualbox-kmp-preempt-6.1.34_k5.3.18_150300.59.63-lp153.2.27.1.x86_64",
"openSUSE Leap 15.3:virtualbox-qt-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-vnc-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-websrv-6.1.34-lp153.2.27.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-01-20T09:04:27Z",
"details": "moderate"
}
],
"title": "CVE-2021-42378"
},
{
"cve": "CVE-2021-42379",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-42379"
}
],
"notes": [
{
"category": "general",
"text": "A use-after-free in Busybox\u0027s awk applet leads to denial of service and possibly code execution when processing a crafted awk pattern in the next_input_file function",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.3:busybox-1.34.1-4.9.1.aarch64",
"openSUSE Leap 15.3:busybox-1.34.1-4.9.1.ppc64le",
"openSUSE Leap 15.3:busybox-1.34.1-4.9.1.s390x",
"openSUSE Leap 15.3:busybox-1.34.1-4.9.1.x86_64",
"openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.aarch64",
"openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.ppc64le",
"openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.s390x",
"openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.x86_64",
"openSUSE Leap 15.3:python3-virtualbox-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-devel-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-guest-desktop-icons-6.1.34-lp153.2.27.2.noarch",
"openSUSE Leap 15.3:virtualbox-guest-source-6.1.34-lp153.2.27.2.noarch",
"openSUSE Leap 15.3:virtualbox-guest-tools-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-guest-x11-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-host-source-6.1.34-lp153.2.27.2.noarch",
"openSUSE Leap 15.3:virtualbox-kmp-default-6.1.34_k5.3.18_150300.59.63-lp153.2.27.1.x86_64",
"openSUSE Leap 15.3:virtualbox-kmp-preempt-6.1.34_k5.3.18_150300.59.63-lp153.2.27.1.x86_64",
"openSUSE Leap 15.3:virtualbox-qt-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-vnc-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-websrv-6.1.34-lp153.2.27.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-42379",
"url": "https://www.suse.com/security/cve/CVE-2021-42379"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.3:busybox-1.34.1-4.9.1.aarch64",
"openSUSE Leap 15.3:busybox-1.34.1-4.9.1.ppc64le",
"openSUSE Leap 15.3:busybox-1.34.1-4.9.1.s390x",
"openSUSE Leap 15.3:busybox-1.34.1-4.9.1.x86_64",
"openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.aarch64",
"openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.ppc64le",
"openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.s390x",
"openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.x86_64",
"openSUSE Leap 15.3:python3-virtualbox-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-devel-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-guest-desktop-icons-6.1.34-lp153.2.27.2.noarch",
"openSUSE Leap 15.3:virtualbox-guest-source-6.1.34-lp153.2.27.2.noarch",
"openSUSE Leap 15.3:virtualbox-guest-tools-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-guest-x11-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-host-source-6.1.34-lp153.2.27.2.noarch",
"openSUSE Leap 15.3:virtualbox-kmp-default-6.1.34_k5.3.18_150300.59.63-lp153.2.27.1.x86_64",
"openSUSE Leap 15.3:virtualbox-kmp-preempt-6.1.34_k5.3.18_150300.59.63-lp153.2.27.1.x86_64",
"openSUSE Leap 15.3:virtualbox-qt-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-vnc-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-websrv-6.1.34-lp153.2.27.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.6,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.3:busybox-1.34.1-4.9.1.aarch64",
"openSUSE Leap 15.3:busybox-1.34.1-4.9.1.ppc64le",
"openSUSE Leap 15.3:busybox-1.34.1-4.9.1.s390x",
"openSUSE Leap 15.3:busybox-1.34.1-4.9.1.x86_64",
"openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.aarch64",
"openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.ppc64le",
"openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.s390x",
"openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.x86_64",
"openSUSE Leap 15.3:python3-virtualbox-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-devel-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-guest-desktop-icons-6.1.34-lp153.2.27.2.noarch",
"openSUSE Leap 15.3:virtualbox-guest-source-6.1.34-lp153.2.27.2.noarch",
"openSUSE Leap 15.3:virtualbox-guest-tools-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-guest-x11-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-host-source-6.1.34-lp153.2.27.2.noarch",
"openSUSE Leap 15.3:virtualbox-kmp-default-6.1.34_k5.3.18_150300.59.63-lp153.2.27.1.x86_64",
"openSUSE Leap 15.3:virtualbox-kmp-preempt-6.1.34_k5.3.18_150300.59.63-lp153.2.27.1.x86_64",
"openSUSE Leap 15.3:virtualbox-qt-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-vnc-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-websrv-6.1.34-lp153.2.27.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-01-20T09:04:27Z",
"details": "moderate"
}
],
"title": "CVE-2021-42379"
},
{
"cve": "CVE-2021-42380",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-42380"
}
],
"notes": [
{
"category": "general",
"text": "A use-after-free in Busybox\u0027s awk applet leads to denial of service and possibly code execution when processing a crafted awk pattern in the clrvar function",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.3:busybox-1.34.1-4.9.1.aarch64",
"openSUSE Leap 15.3:busybox-1.34.1-4.9.1.ppc64le",
"openSUSE Leap 15.3:busybox-1.34.1-4.9.1.s390x",
"openSUSE Leap 15.3:busybox-1.34.1-4.9.1.x86_64",
"openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.aarch64",
"openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.ppc64le",
"openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.s390x",
"openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.x86_64",
"openSUSE Leap 15.3:python3-virtualbox-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-devel-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-guest-desktop-icons-6.1.34-lp153.2.27.2.noarch",
"openSUSE Leap 15.3:virtualbox-guest-source-6.1.34-lp153.2.27.2.noarch",
"openSUSE Leap 15.3:virtualbox-guest-tools-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-guest-x11-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-host-source-6.1.34-lp153.2.27.2.noarch",
"openSUSE Leap 15.3:virtualbox-kmp-default-6.1.34_k5.3.18_150300.59.63-lp153.2.27.1.x86_64",
"openSUSE Leap 15.3:virtualbox-kmp-preempt-6.1.34_k5.3.18_150300.59.63-lp153.2.27.1.x86_64",
"openSUSE Leap 15.3:virtualbox-qt-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-vnc-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-websrv-6.1.34-lp153.2.27.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-42380",
"url": "https://www.suse.com/security/cve/CVE-2021-42380"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.3:busybox-1.34.1-4.9.1.aarch64",
"openSUSE Leap 15.3:busybox-1.34.1-4.9.1.ppc64le",
"openSUSE Leap 15.3:busybox-1.34.1-4.9.1.s390x",
"openSUSE Leap 15.3:busybox-1.34.1-4.9.1.x86_64",
"openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.aarch64",
"openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.ppc64le",
"openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.s390x",
"openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.x86_64",
"openSUSE Leap 15.3:python3-virtualbox-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-devel-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-guest-desktop-icons-6.1.34-lp153.2.27.2.noarch",
"openSUSE Leap 15.3:virtualbox-guest-source-6.1.34-lp153.2.27.2.noarch",
"openSUSE Leap 15.3:virtualbox-guest-tools-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-guest-x11-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-host-source-6.1.34-lp153.2.27.2.noarch",
"openSUSE Leap 15.3:virtualbox-kmp-default-6.1.34_k5.3.18_150300.59.63-lp153.2.27.1.x86_64",
"openSUSE Leap 15.3:virtualbox-kmp-preempt-6.1.34_k5.3.18_150300.59.63-lp153.2.27.1.x86_64",
"openSUSE Leap 15.3:virtualbox-qt-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-vnc-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-websrv-6.1.34-lp153.2.27.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.6,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.3:busybox-1.34.1-4.9.1.aarch64",
"openSUSE Leap 15.3:busybox-1.34.1-4.9.1.ppc64le",
"openSUSE Leap 15.3:busybox-1.34.1-4.9.1.s390x",
"openSUSE Leap 15.3:busybox-1.34.1-4.9.1.x86_64",
"openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.aarch64",
"openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.ppc64le",
"openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.s390x",
"openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.x86_64",
"openSUSE Leap 15.3:python3-virtualbox-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-devel-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-guest-desktop-icons-6.1.34-lp153.2.27.2.noarch",
"openSUSE Leap 15.3:virtualbox-guest-source-6.1.34-lp153.2.27.2.noarch",
"openSUSE Leap 15.3:virtualbox-guest-tools-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-guest-x11-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-host-source-6.1.34-lp153.2.27.2.noarch",
"openSUSE Leap 15.3:virtualbox-kmp-default-6.1.34_k5.3.18_150300.59.63-lp153.2.27.1.x86_64",
"openSUSE Leap 15.3:virtualbox-kmp-preempt-6.1.34_k5.3.18_150300.59.63-lp153.2.27.1.x86_64",
"openSUSE Leap 15.3:virtualbox-qt-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-vnc-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-websrv-6.1.34-lp153.2.27.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-01-20T09:04:27Z",
"details": "moderate"
}
],
"title": "CVE-2021-42380"
},
{
"cve": "CVE-2021-42381",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-42381"
}
],
"notes": [
{
"category": "general",
"text": "A use-after-free in Busybox\u0027s awk applet leads to denial of service and possibly code execution when processing a crafted awk pattern in the hash_init function",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.3:busybox-1.34.1-4.9.1.aarch64",
"openSUSE Leap 15.3:busybox-1.34.1-4.9.1.ppc64le",
"openSUSE Leap 15.3:busybox-1.34.1-4.9.1.s390x",
"openSUSE Leap 15.3:busybox-1.34.1-4.9.1.x86_64",
"openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.aarch64",
"openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.ppc64le",
"openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.s390x",
"openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.x86_64",
"openSUSE Leap 15.3:python3-virtualbox-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-devel-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-guest-desktop-icons-6.1.34-lp153.2.27.2.noarch",
"openSUSE Leap 15.3:virtualbox-guest-source-6.1.34-lp153.2.27.2.noarch",
"openSUSE Leap 15.3:virtualbox-guest-tools-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-guest-x11-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-host-source-6.1.34-lp153.2.27.2.noarch",
"openSUSE Leap 15.3:virtualbox-kmp-default-6.1.34_k5.3.18_150300.59.63-lp153.2.27.1.x86_64",
"openSUSE Leap 15.3:virtualbox-kmp-preempt-6.1.34_k5.3.18_150300.59.63-lp153.2.27.1.x86_64",
"openSUSE Leap 15.3:virtualbox-qt-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-vnc-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-websrv-6.1.34-lp153.2.27.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-42381",
"url": "https://www.suse.com/security/cve/CVE-2021-42381"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.3:busybox-1.34.1-4.9.1.aarch64",
"openSUSE Leap 15.3:busybox-1.34.1-4.9.1.ppc64le",
"openSUSE Leap 15.3:busybox-1.34.1-4.9.1.s390x",
"openSUSE Leap 15.3:busybox-1.34.1-4.9.1.x86_64",
"openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.aarch64",
"openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.ppc64le",
"openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.s390x",
"openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.x86_64",
"openSUSE Leap 15.3:python3-virtualbox-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-devel-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-guest-desktop-icons-6.1.34-lp153.2.27.2.noarch",
"openSUSE Leap 15.3:virtualbox-guest-source-6.1.34-lp153.2.27.2.noarch",
"openSUSE Leap 15.3:virtualbox-guest-tools-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-guest-x11-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-host-source-6.1.34-lp153.2.27.2.noarch",
"openSUSE Leap 15.3:virtualbox-kmp-default-6.1.34_k5.3.18_150300.59.63-lp153.2.27.1.x86_64",
"openSUSE Leap 15.3:virtualbox-kmp-preempt-6.1.34_k5.3.18_150300.59.63-lp153.2.27.1.x86_64",
"openSUSE Leap 15.3:virtualbox-qt-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-vnc-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-websrv-6.1.34-lp153.2.27.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.6,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.3:busybox-1.34.1-4.9.1.aarch64",
"openSUSE Leap 15.3:busybox-1.34.1-4.9.1.ppc64le",
"openSUSE Leap 15.3:busybox-1.34.1-4.9.1.s390x",
"openSUSE Leap 15.3:busybox-1.34.1-4.9.1.x86_64",
"openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.aarch64",
"openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.ppc64le",
"openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.s390x",
"openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.x86_64",
"openSUSE Leap 15.3:python3-virtualbox-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-devel-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-guest-desktop-icons-6.1.34-lp153.2.27.2.noarch",
"openSUSE Leap 15.3:virtualbox-guest-source-6.1.34-lp153.2.27.2.noarch",
"openSUSE Leap 15.3:virtualbox-guest-tools-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-guest-x11-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-host-source-6.1.34-lp153.2.27.2.noarch",
"openSUSE Leap 15.3:virtualbox-kmp-default-6.1.34_k5.3.18_150300.59.63-lp153.2.27.1.x86_64",
"openSUSE Leap 15.3:virtualbox-kmp-preempt-6.1.34_k5.3.18_150300.59.63-lp153.2.27.1.x86_64",
"openSUSE Leap 15.3:virtualbox-qt-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-vnc-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-websrv-6.1.34-lp153.2.27.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-01-20T09:04:27Z",
"details": "moderate"
}
],
"title": "CVE-2021-42381"
},
{
"cve": "CVE-2021-42382",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-42382"
}
],
"notes": [
{
"category": "general",
"text": "A use-after-free in Busybox\u0027s awk applet leads to denial of service and possibly code execution when processing a crafted awk pattern in the getvar_s function",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.3:busybox-1.34.1-4.9.1.aarch64",
"openSUSE Leap 15.3:busybox-1.34.1-4.9.1.ppc64le",
"openSUSE Leap 15.3:busybox-1.34.1-4.9.1.s390x",
"openSUSE Leap 15.3:busybox-1.34.1-4.9.1.x86_64",
"openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.aarch64",
"openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.ppc64le",
"openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.s390x",
"openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.x86_64",
"openSUSE Leap 15.3:python3-virtualbox-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-devel-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-guest-desktop-icons-6.1.34-lp153.2.27.2.noarch",
"openSUSE Leap 15.3:virtualbox-guest-source-6.1.34-lp153.2.27.2.noarch",
"openSUSE Leap 15.3:virtualbox-guest-tools-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-guest-x11-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-host-source-6.1.34-lp153.2.27.2.noarch",
"openSUSE Leap 15.3:virtualbox-kmp-default-6.1.34_k5.3.18_150300.59.63-lp153.2.27.1.x86_64",
"openSUSE Leap 15.3:virtualbox-kmp-preempt-6.1.34_k5.3.18_150300.59.63-lp153.2.27.1.x86_64",
"openSUSE Leap 15.3:virtualbox-qt-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-vnc-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-websrv-6.1.34-lp153.2.27.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-42382",
"url": "https://www.suse.com/security/cve/CVE-2021-42382"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.3:busybox-1.34.1-4.9.1.aarch64",
"openSUSE Leap 15.3:busybox-1.34.1-4.9.1.ppc64le",
"openSUSE Leap 15.3:busybox-1.34.1-4.9.1.s390x",
"openSUSE Leap 15.3:busybox-1.34.1-4.9.1.x86_64",
"openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.aarch64",
"openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.ppc64le",
"openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.s390x",
"openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.x86_64",
"openSUSE Leap 15.3:python3-virtualbox-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-devel-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-guest-desktop-icons-6.1.34-lp153.2.27.2.noarch",
"openSUSE Leap 15.3:virtualbox-guest-source-6.1.34-lp153.2.27.2.noarch",
"openSUSE Leap 15.3:virtualbox-guest-tools-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-guest-x11-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-host-source-6.1.34-lp153.2.27.2.noarch",
"openSUSE Leap 15.3:virtualbox-kmp-default-6.1.34_k5.3.18_150300.59.63-lp153.2.27.1.x86_64",
"openSUSE Leap 15.3:virtualbox-kmp-preempt-6.1.34_k5.3.18_150300.59.63-lp153.2.27.1.x86_64",
"openSUSE Leap 15.3:virtualbox-qt-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-vnc-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-websrv-6.1.34-lp153.2.27.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.6,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.3:busybox-1.34.1-4.9.1.aarch64",
"openSUSE Leap 15.3:busybox-1.34.1-4.9.1.ppc64le",
"openSUSE Leap 15.3:busybox-1.34.1-4.9.1.s390x",
"openSUSE Leap 15.3:busybox-1.34.1-4.9.1.x86_64",
"openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.aarch64",
"openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.ppc64le",
"openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.s390x",
"openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.x86_64",
"openSUSE Leap 15.3:python3-virtualbox-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-devel-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-guest-desktop-icons-6.1.34-lp153.2.27.2.noarch",
"openSUSE Leap 15.3:virtualbox-guest-source-6.1.34-lp153.2.27.2.noarch",
"openSUSE Leap 15.3:virtualbox-guest-tools-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-guest-x11-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-host-source-6.1.34-lp153.2.27.2.noarch",
"openSUSE Leap 15.3:virtualbox-kmp-default-6.1.34_k5.3.18_150300.59.63-lp153.2.27.1.x86_64",
"openSUSE Leap 15.3:virtualbox-kmp-preempt-6.1.34_k5.3.18_150300.59.63-lp153.2.27.1.x86_64",
"openSUSE Leap 15.3:virtualbox-qt-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-vnc-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-websrv-6.1.34-lp153.2.27.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-01-20T09:04:27Z",
"details": "moderate"
}
],
"title": "CVE-2021-42382"
},
{
"cve": "CVE-2021-42383",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-42383"
}
],
"notes": [
{
"category": "general",
"text": "A use-after-free in Busybox\u0027s awk applet leads to denial of service and possibly code execution when processing a crafted awk pattern in the evaluate function",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.3:busybox-1.34.1-4.9.1.aarch64",
"openSUSE Leap 15.3:busybox-1.34.1-4.9.1.ppc64le",
"openSUSE Leap 15.3:busybox-1.34.1-4.9.1.s390x",
"openSUSE Leap 15.3:busybox-1.34.1-4.9.1.x86_64",
"openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.aarch64",
"openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.ppc64le",
"openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.s390x",
"openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.x86_64",
"openSUSE Leap 15.3:python3-virtualbox-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-devel-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-guest-desktop-icons-6.1.34-lp153.2.27.2.noarch",
"openSUSE Leap 15.3:virtualbox-guest-source-6.1.34-lp153.2.27.2.noarch",
"openSUSE Leap 15.3:virtualbox-guest-tools-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-guest-x11-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-host-source-6.1.34-lp153.2.27.2.noarch",
"openSUSE Leap 15.3:virtualbox-kmp-default-6.1.34_k5.3.18_150300.59.63-lp153.2.27.1.x86_64",
"openSUSE Leap 15.3:virtualbox-kmp-preempt-6.1.34_k5.3.18_150300.59.63-lp153.2.27.1.x86_64",
"openSUSE Leap 15.3:virtualbox-qt-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-vnc-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-websrv-6.1.34-lp153.2.27.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-42383",
"url": "https://www.suse.com/security/cve/CVE-2021-42383"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.3:busybox-1.34.1-4.9.1.aarch64",
"openSUSE Leap 15.3:busybox-1.34.1-4.9.1.ppc64le",
"openSUSE Leap 15.3:busybox-1.34.1-4.9.1.s390x",
"openSUSE Leap 15.3:busybox-1.34.1-4.9.1.x86_64",
"openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.aarch64",
"openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.ppc64le",
"openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.s390x",
"openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.x86_64",
"openSUSE Leap 15.3:python3-virtualbox-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-devel-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-guest-desktop-icons-6.1.34-lp153.2.27.2.noarch",
"openSUSE Leap 15.3:virtualbox-guest-source-6.1.34-lp153.2.27.2.noarch",
"openSUSE Leap 15.3:virtualbox-guest-tools-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-guest-x11-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-host-source-6.1.34-lp153.2.27.2.noarch",
"openSUSE Leap 15.3:virtualbox-kmp-default-6.1.34_k5.3.18_150300.59.63-lp153.2.27.1.x86_64",
"openSUSE Leap 15.3:virtualbox-kmp-preempt-6.1.34_k5.3.18_150300.59.63-lp153.2.27.1.x86_64",
"openSUSE Leap 15.3:virtualbox-qt-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-vnc-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-websrv-6.1.34-lp153.2.27.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.6,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.3:busybox-1.34.1-4.9.1.aarch64",
"openSUSE Leap 15.3:busybox-1.34.1-4.9.1.ppc64le",
"openSUSE Leap 15.3:busybox-1.34.1-4.9.1.s390x",
"openSUSE Leap 15.3:busybox-1.34.1-4.9.1.x86_64",
"openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.aarch64",
"openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.ppc64le",
"openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.s390x",
"openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.x86_64",
"openSUSE Leap 15.3:python3-virtualbox-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-devel-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-guest-desktop-icons-6.1.34-lp153.2.27.2.noarch",
"openSUSE Leap 15.3:virtualbox-guest-source-6.1.34-lp153.2.27.2.noarch",
"openSUSE Leap 15.3:virtualbox-guest-tools-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-guest-x11-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-host-source-6.1.34-lp153.2.27.2.noarch",
"openSUSE Leap 15.3:virtualbox-kmp-default-6.1.34_k5.3.18_150300.59.63-lp153.2.27.1.x86_64",
"openSUSE Leap 15.3:virtualbox-kmp-preempt-6.1.34_k5.3.18_150300.59.63-lp153.2.27.1.x86_64",
"openSUSE Leap 15.3:virtualbox-qt-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-vnc-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-websrv-6.1.34-lp153.2.27.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-01-20T09:04:27Z",
"details": "moderate"
}
],
"title": "CVE-2021-42383"
},
{
"cve": "CVE-2021-42384",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-42384"
}
],
"notes": [
{
"category": "general",
"text": "A use-after-free in Busybox\u0027s awk applet leads to denial of service and possibly code execution when processing a crafted awk pattern in the handle_special function",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.3:busybox-1.34.1-4.9.1.aarch64",
"openSUSE Leap 15.3:busybox-1.34.1-4.9.1.ppc64le",
"openSUSE Leap 15.3:busybox-1.34.1-4.9.1.s390x",
"openSUSE Leap 15.3:busybox-1.34.1-4.9.1.x86_64",
"openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.aarch64",
"openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.ppc64le",
"openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.s390x",
"openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.x86_64",
"openSUSE Leap 15.3:python3-virtualbox-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-devel-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-guest-desktop-icons-6.1.34-lp153.2.27.2.noarch",
"openSUSE Leap 15.3:virtualbox-guest-source-6.1.34-lp153.2.27.2.noarch",
"openSUSE Leap 15.3:virtualbox-guest-tools-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-guest-x11-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-host-source-6.1.34-lp153.2.27.2.noarch",
"openSUSE Leap 15.3:virtualbox-kmp-default-6.1.34_k5.3.18_150300.59.63-lp153.2.27.1.x86_64",
"openSUSE Leap 15.3:virtualbox-kmp-preempt-6.1.34_k5.3.18_150300.59.63-lp153.2.27.1.x86_64",
"openSUSE Leap 15.3:virtualbox-qt-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-vnc-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-websrv-6.1.34-lp153.2.27.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-42384",
"url": "https://www.suse.com/security/cve/CVE-2021-42384"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.3:busybox-1.34.1-4.9.1.aarch64",
"openSUSE Leap 15.3:busybox-1.34.1-4.9.1.ppc64le",
"openSUSE Leap 15.3:busybox-1.34.1-4.9.1.s390x",
"openSUSE Leap 15.3:busybox-1.34.1-4.9.1.x86_64",
"openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.aarch64",
"openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.ppc64le",
"openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.s390x",
"openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.x86_64",
"openSUSE Leap 15.3:python3-virtualbox-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-devel-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-guest-desktop-icons-6.1.34-lp153.2.27.2.noarch",
"openSUSE Leap 15.3:virtualbox-guest-source-6.1.34-lp153.2.27.2.noarch",
"openSUSE Leap 15.3:virtualbox-guest-tools-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-guest-x11-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-host-source-6.1.34-lp153.2.27.2.noarch",
"openSUSE Leap 15.3:virtualbox-kmp-default-6.1.34_k5.3.18_150300.59.63-lp153.2.27.1.x86_64",
"openSUSE Leap 15.3:virtualbox-kmp-preempt-6.1.34_k5.3.18_150300.59.63-lp153.2.27.1.x86_64",
"openSUSE Leap 15.3:virtualbox-qt-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-vnc-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-websrv-6.1.34-lp153.2.27.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.6,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.3:busybox-1.34.1-4.9.1.aarch64",
"openSUSE Leap 15.3:busybox-1.34.1-4.9.1.ppc64le",
"openSUSE Leap 15.3:busybox-1.34.1-4.9.1.s390x",
"openSUSE Leap 15.3:busybox-1.34.1-4.9.1.x86_64",
"openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.aarch64",
"openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.ppc64le",
"openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.s390x",
"openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.x86_64",
"openSUSE Leap 15.3:python3-virtualbox-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-devel-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-guest-desktop-icons-6.1.34-lp153.2.27.2.noarch",
"openSUSE Leap 15.3:virtualbox-guest-source-6.1.34-lp153.2.27.2.noarch",
"openSUSE Leap 15.3:virtualbox-guest-tools-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-guest-x11-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-host-source-6.1.34-lp153.2.27.2.noarch",
"openSUSE Leap 15.3:virtualbox-kmp-default-6.1.34_k5.3.18_150300.59.63-lp153.2.27.1.x86_64",
"openSUSE Leap 15.3:virtualbox-kmp-preempt-6.1.34_k5.3.18_150300.59.63-lp153.2.27.1.x86_64",
"openSUSE Leap 15.3:virtualbox-qt-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-vnc-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-websrv-6.1.34-lp153.2.27.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-01-20T09:04:27Z",
"details": "moderate"
}
],
"title": "CVE-2021-42384"
},
{
"cve": "CVE-2021-42385",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-42385"
}
],
"notes": [
{
"category": "general",
"text": "A use-after-free in Busybox\u0027s awk applet leads to denial of service and possibly code execution when processing a crafted awk pattern in the evaluate function",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.3:busybox-1.34.1-4.9.1.aarch64",
"openSUSE Leap 15.3:busybox-1.34.1-4.9.1.ppc64le",
"openSUSE Leap 15.3:busybox-1.34.1-4.9.1.s390x",
"openSUSE Leap 15.3:busybox-1.34.1-4.9.1.x86_64",
"openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.aarch64",
"openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.ppc64le",
"openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.s390x",
"openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.x86_64",
"openSUSE Leap 15.3:python3-virtualbox-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-devel-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-guest-desktop-icons-6.1.34-lp153.2.27.2.noarch",
"openSUSE Leap 15.3:virtualbox-guest-source-6.1.34-lp153.2.27.2.noarch",
"openSUSE Leap 15.3:virtualbox-guest-tools-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-guest-x11-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-host-source-6.1.34-lp153.2.27.2.noarch",
"openSUSE Leap 15.3:virtualbox-kmp-default-6.1.34_k5.3.18_150300.59.63-lp153.2.27.1.x86_64",
"openSUSE Leap 15.3:virtualbox-kmp-preempt-6.1.34_k5.3.18_150300.59.63-lp153.2.27.1.x86_64",
"openSUSE Leap 15.3:virtualbox-qt-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-vnc-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-websrv-6.1.34-lp153.2.27.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-42385",
"url": "https://www.suse.com/security/cve/CVE-2021-42385"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.3:busybox-1.34.1-4.9.1.aarch64",
"openSUSE Leap 15.3:busybox-1.34.1-4.9.1.ppc64le",
"openSUSE Leap 15.3:busybox-1.34.1-4.9.1.s390x",
"openSUSE Leap 15.3:busybox-1.34.1-4.9.1.x86_64",
"openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.aarch64",
"openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.ppc64le",
"openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.s390x",
"openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.x86_64",
"openSUSE Leap 15.3:python3-virtualbox-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-devel-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-guest-desktop-icons-6.1.34-lp153.2.27.2.noarch",
"openSUSE Leap 15.3:virtualbox-guest-source-6.1.34-lp153.2.27.2.noarch",
"openSUSE Leap 15.3:virtualbox-guest-tools-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-guest-x11-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-host-source-6.1.34-lp153.2.27.2.noarch",
"openSUSE Leap 15.3:virtualbox-kmp-default-6.1.34_k5.3.18_150300.59.63-lp153.2.27.1.x86_64",
"openSUSE Leap 15.3:virtualbox-kmp-preempt-6.1.34_k5.3.18_150300.59.63-lp153.2.27.1.x86_64",
"openSUSE Leap 15.3:virtualbox-qt-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-vnc-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-websrv-6.1.34-lp153.2.27.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.6,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.3:busybox-1.34.1-4.9.1.aarch64",
"openSUSE Leap 15.3:busybox-1.34.1-4.9.1.ppc64le",
"openSUSE Leap 15.3:busybox-1.34.1-4.9.1.s390x",
"openSUSE Leap 15.3:busybox-1.34.1-4.9.1.x86_64",
"openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.aarch64",
"openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.ppc64le",
"openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.s390x",
"openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.x86_64",
"openSUSE Leap 15.3:python3-virtualbox-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-devel-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-guest-desktop-icons-6.1.34-lp153.2.27.2.noarch",
"openSUSE Leap 15.3:virtualbox-guest-source-6.1.34-lp153.2.27.2.noarch",
"openSUSE Leap 15.3:virtualbox-guest-tools-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-guest-x11-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-host-source-6.1.34-lp153.2.27.2.noarch",
"openSUSE Leap 15.3:virtualbox-kmp-default-6.1.34_k5.3.18_150300.59.63-lp153.2.27.1.x86_64",
"openSUSE Leap 15.3:virtualbox-kmp-preempt-6.1.34_k5.3.18_150300.59.63-lp153.2.27.1.x86_64",
"openSUSE Leap 15.3:virtualbox-qt-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-vnc-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-websrv-6.1.34-lp153.2.27.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-01-20T09:04:27Z",
"details": "moderate"
}
],
"title": "CVE-2021-42385"
},
{
"cve": "CVE-2021-42386",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-42386"
}
],
"notes": [
{
"category": "general",
"text": "A use-after-free in Busybox\u0027s awk applet leads to denial of service and possibly code execution when processing a crafted awk pattern in the nvalloc function",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.3:busybox-1.34.1-4.9.1.aarch64",
"openSUSE Leap 15.3:busybox-1.34.1-4.9.1.ppc64le",
"openSUSE Leap 15.3:busybox-1.34.1-4.9.1.s390x",
"openSUSE Leap 15.3:busybox-1.34.1-4.9.1.x86_64",
"openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.aarch64",
"openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.ppc64le",
"openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.s390x",
"openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.x86_64",
"openSUSE Leap 15.3:python3-virtualbox-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-devel-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-guest-desktop-icons-6.1.34-lp153.2.27.2.noarch",
"openSUSE Leap 15.3:virtualbox-guest-source-6.1.34-lp153.2.27.2.noarch",
"openSUSE Leap 15.3:virtualbox-guest-tools-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-guest-x11-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-host-source-6.1.34-lp153.2.27.2.noarch",
"openSUSE Leap 15.3:virtualbox-kmp-default-6.1.34_k5.3.18_150300.59.63-lp153.2.27.1.x86_64",
"openSUSE Leap 15.3:virtualbox-kmp-preempt-6.1.34_k5.3.18_150300.59.63-lp153.2.27.1.x86_64",
"openSUSE Leap 15.3:virtualbox-qt-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-vnc-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-websrv-6.1.34-lp153.2.27.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-42386",
"url": "https://www.suse.com/security/cve/CVE-2021-42386"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.3:busybox-1.34.1-4.9.1.aarch64",
"openSUSE Leap 15.3:busybox-1.34.1-4.9.1.ppc64le",
"openSUSE Leap 15.3:busybox-1.34.1-4.9.1.s390x",
"openSUSE Leap 15.3:busybox-1.34.1-4.9.1.x86_64",
"openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.aarch64",
"openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.ppc64le",
"openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.s390x",
"openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.x86_64",
"openSUSE Leap 15.3:python3-virtualbox-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-devel-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-guest-desktop-icons-6.1.34-lp153.2.27.2.noarch",
"openSUSE Leap 15.3:virtualbox-guest-source-6.1.34-lp153.2.27.2.noarch",
"openSUSE Leap 15.3:virtualbox-guest-tools-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-guest-x11-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-host-source-6.1.34-lp153.2.27.2.noarch",
"openSUSE Leap 15.3:virtualbox-kmp-default-6.1.34_k5.3.18_150300.59.63-lp153.2.27.1.x86_64",
"openSUSE Leap 15.3:virtualbox-kmp-preempt-6.1.34_k5.3.18_150300.59.63-lp153.2.27.1.x86_64",
"openSUSE Leap 15.3:virtualbox-qt-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-vnc-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-websrv-6.1.34-lp153.2.27.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.6,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.3:busybox-1.34.1-4.9.1.aarch64",
"openSUSE Leap 15.3:busybox-1.34.1-4.9.1.ppc64le",
"openSUSE Leap 15.3:busybox-1.34.1-4.9.1.s390x",
"openSUSE Leap 15.3:busybox-1.34.1-4.9.1.x86_64",
"openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.aarch64",
"openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.ppc64le",
"openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.s390x",
"openSUSE Leap 15.3:busybox-static-1.34.1-4.9.1.x86_64",
"openSUSE Leap 15.3:python3-virtualbox-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-devel-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-guest-desktop-icons-6.1.34-lp153.2.27.2.noarch",
"openSUSE Leap 15.3:virtualbox-guest-source-6.1.34-lp153.2.27.2.noarch",
"openSUSE Leap 15.3:virtualbox-guest-tools-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-guest-x11-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-host-source-6.1.34-lp153.2.27.2.noarch",
"openSUSE Leap 15.3:virtualbox-kmp-default-6.1.34_k5.3.18_150300.59.63-lp153.2.27.1.x86_64",
"openSUSE Leap 15.3:virtualbox-kmp-preempt-6.1.34_k5.3.18_150300.59.63-lp153.2.27.1.x86_64",
"openSUSE Leap 15.3:virtualbox-qt-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-vnc-6.1.34-lp153.2.27.2.x86_64",
"openSUSE Leap 15.3:virtualbox-websrv-6.1.34-lp153.2.27.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-01-20T09:04:27Z",
"details": "moderate"
}
],
"title": "CVE-2021-42386"
}
]
}
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.